VeryPDF Image2PDF Converter SEH buffer oevrflow exploit that spawns messagebox shellcode.
Monthly Archives: October 2015
FreeYouTubeToMP3 Converter 4.0.1 Buffer Overflow
FreeYouTubeToMP3 Converter version 4.0.1 suffers from a buffer overflow vulnerability.
WebComIndia CMS 2015Q4 Authentication Bypass
WebComIndia CMS 2015Q4 suffers from an authentication bypass vulnerability via remote SQL injection.
Bugtraq: Potential vulnerabilites in PayPal Beacons
Potential vulnerabilites in PayPal Beacons
Bugtraq: [RT-SA-2015-006] Buffalo LinkStation Authentication Bypass
[RT-SA-2015-006] Buffalo LinkStation Authentication Bypass
RHBA-2015:1878-1: openstack-nova bug fix advisory
Red Hat Enterprise Linux: Updated OpenStack Compute packages that resolve various issues are now
available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for
RHEL 7.
RHBA-2015:1877-1: openstack-heat bug fix advisory
Red Hat Enterprise Linux: Updated OpenStack Orchestration packages that resolve various issues are
now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno)
for RHEL 7.
PayPal Open Redirect
PayPal suffered from an open redirect vulnerability.
IC3 Releases Alert on Microchip-Enabled Credit Cards
Original release date: October 08, 2015
The Internet Crime Complaint Center (IC3) has issued an alert to consumers and merchants about the security risks involved with EMV Cards. An EMV card is a credit or debit card with a microchip that helps protect cardholder data. However, EMV cards may still be vulnerable to exploitation.
US-CERT encourages consumers and merchants to review the IC3 Alert for information on EMV card vulnerabilities and proactive defensive measures.
This product is provided subject to this Notification and this Privacy & Use policy.
DSA-3371 spice – security update
Frediano Ziglio of Red Hat discovered several vulnerabilities in spice,
a SPICE protocol client and server library. A malicious guest can
exploit these flaws to cause a denial of service (QEMU process crash),
execute arbitrary code on the host with the privileges of the hosting
QEMU process or read and write arbitrary memory locations on the host.