TestLink 1.9.14 Persistent XSS

Posted by Aravind on Nov 10

Information
=================================
Name: Persistent XSS Vulnerability in TestLink 1.9.14
Affected Software: TestLink
Affected Versions: 1.9.14 and possibly below
Vendor Homepage: http://testlink.org/
Severity: High
Status: Fixed

Vulnerability Type:
=================================
Persistent XSS

CVE Reference:
=================================
Not assigned

Technical Details:
=================================
Persistent XSS entry…

TestLink 1.9.14 CSRF Vulnerability

Posted by Aravind on Nov 10

Information
=================================
Name: CSRF Vulnerability in TestLink 1.9.14
Affected Software: TestLink
Affected Versions: 1.9.14 and possibly below
Vendor Homepage: http://testlink.org/
Severity: High
Status: Fixed

Vulnerability Type:
=================================
Cross Site Request Forgery (CSRF)

CVE Reference:
=================================
Not assigned

Technical Details:
=================================
Even though…

3108638 – Update for Windows Hyper-V to Address CPU Weakness – Version: 1.0

Revision Note: V1.0 (November 10, 2015): Advisory published.
Summary: Microsoft is announcing the availability of a security update for Windows Hyper-V to protect against a denial of service condition that can be triggered with certain central processing unit (CPU) chipsets. Although the weakness resides in the chipset, Microsoft is issuing this security update to protect customers. The update prevents guests on a Hyper-V system from triggering a weakness in the CPU that could allow instructions from a Hyper-V guest to place its Hyper-V host’s CPU into an unresponsive state, leading to a denial of service condition for the guest operating systems running on the affected host. Successful exploitation of the CPU weakness would require kernel-mode code execution privileges on the guest operating system.

MS15-113 – Critical: Cumulative Security Update for Microsoft Edge (3104519) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (November 10, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-112 – Critical: Cumulative Security Update for Internet Explorer (3104517) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (November 10, 2015): Click here to enter text.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-114 – Critical: Security Update for Windows Journal to Address Remote Code Execution (3100213) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (November 10, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

MS15-115 – Critical: Security Update for Microsoft Windows to Address Remote Code Execution (3105864) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (November 10, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted webpage that contains embedded fonts.