Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680.
Monthly Archives: September 2015
DirectAdmin 1.483 Cross Site Request Forgery / Cross Site Scripting
DirectAdmin web control panel version 1.483 suffers from cross site request forgery and cross site scripting vulnerabilities.
Ubuntu Security Notice USN-2735-1
Ubuntu Security Notice 2735-1 – It was discovered that the DOM tree could be corrupted during parsing in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions or cause a denial of service. An issue was discovered in NavigatorServiceWorker::serviceWorker in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. Various other issues were also addressed.
IBM AIX HACMP Privlege Escalation
IBM AIX High Availability Cluster Multiprocessing (HACMP) suffers from a local privilege escalation vulnerability that results in root privileges.
Microsoft Releases September 2015 Security Bulletin
Original release date: September 08, 2015
Microsoft has released 12 updates to address vulnerabilities in Microsoft Windows. Exploitation of some of these vulnerabilities could allow an attacker to take control of an affected system.
US-CERT encourages users and administrators to review Microsoft Security Bulletins MS15-094 through MS15-105 and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Cisco Sourcefire User Agent 2.2 Insecure File Permissions
Cisco Sourcefire User Agent version 2.2 suffers from an insecure file permissions vulnerability.
Bugtraq: [CVE-2015-3623] Qlikview blind XXE Security Vulnerability
[CVE-2015-3623] Qlikview blind XXE Security Vulnerability
CESA-2015:1741 Important CentOS 7 haproxySecurity Update
CentOS Errata and Security Advisory 2015:1741 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1741.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: f8d2433b85f82906c7daf609399e86ea61c8599fe291ea7f13e63a83b306b2fb haproxy-1.5.4-4.el7_1.1.x86_64.rpm Source: 0a41b75f4c2c601fd6e26e023ccb046a370a93ee25a74f2ef73f4e485ff3e9ec haproxy-1.5.4-4.el7_1.1.src.rpm
CEBA-2015:1743 CentOS 7 radvd FASTTRACK BugFixUpdate
CentOS Errata and Bugfix Advisory 2015:1743 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1743.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 2f483d1126f4dd5e6dda88c60e5e79b756a5fddbaafbaed343eea7f6712fc733 radvd-1.9.2-9.el7.x86_64.rpm Source: d972627fc03bed72ad243186bca0f41e06cff5a938497af3fa770757555e780a radvd-1.9.2-9.el7.src.rpm
CESA-2015:1742 Moderate CentOS 7 subversionSecurity Update
CentOS Errata and Security Advisory 2015:1742 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1742.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 1ac68982e8d6c3c4f08338e829f9b84b172f98107065097924fb229125151516 mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm 1319d6c52f045e1e43bcb45c6508d3791a17a255c9226cbc943906de3b34eab0 subversion-1.7.14-7.el7_1.1.i686.rpm 5761b0600d662fee4d1cc5c5507a5669648f1442d1f51751e54f773da8b9460f subversion-1.7.14-7.el7_1.1.x86_64.rpm b883397028c9b71a8854f7dbbe7c5aff09cdd82b03444281d4cd3cedcfefc322 subversion-devel-1.7.14-7.el7_1.1.i686.rpm e48a1950a59d980de126d690fa3f8e1be52f6f0735e7a4ef7e613229e126a9fb subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm 965bcce500931a97b42cdc8ef89b5643ebfba5aff1d7aebeba4aef0a201a67d7 subversion-gnome-1.7.14-7.el7_1.1.i686.rpm 44517d753fe363f67c81e4ad38bc41fc7119ba0bb658a43ebfa126b5e6e8a702 subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm 304267248f354b87b4f04f41721a03ba1b9ad8930d1601109b828396f8ddeacc subversion-javahl-1.7.14-7.el7_1.1.i686.rpm 1d1ab0cae3f01ecf9f21c886fc0aa81d9ac0b909c4b8840afb379747a613bd38 subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm f7be0dc76695ba90e8c11b8f9bd62adf93e3c383f3329ff2dc318d4fea58e7c5 subversion-kde-1.7.14-7.el7_1.1.i686.rpm 5cd4c89e73bc8173e04748558a03fd95730f0863fbed3b007620bdf35f5d5741 subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm 26731c80577860969dee68da1009dd0816d54c149d8a8298f8213526c328a100 subversion-libs-1.7.14-7.el7_1.1.i686.rpm eb70a5a6f846a83489ffb5b30d163a536382f5a8260f8d998467a1f37a126258 subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm e0a58ae9d270a340db24c7a1982b9245b86f55924e5f6f532d3670e98799a5c6 subversion-perl-1.7.14-7.el7_1.1.i686.rpm da31f9b3e092e50ecff8ae1c71e465b6b1099b9e057844ddc0699e970fb95683 subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm 5abb5f007da2bc855a86c79778116d45215555559cccbcee02ec2cec2edda9fe subversion-python-1.7.14-7.el7_1.1.x86_64.rpm b954725e526255571c98895f67018d6e45de5d60656ae4909a81b3a24fa48e60 subversion-ruby-1.7.14-7.el7_1.1.i686.rpm 99720bc6cff9a2499cb83927bec535a06401c1765234435b8a194f60a22c0e17 subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm 2c9f4a74ee2c97a5c0c23aeef34ac10281ff04a6ed8c69934058309e1cc08cc8 subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm Source: 2a4bffe27a66fd5f06362c6c8f5544558ccd38d76cda59145a6e9033d252d452 subversion-1.7.14-7.el7_1.1.src.rpm