This bulletin summary lists nine released Microsoft security bulletins for February, 2016.
Monthly Archives: February 2016
OS X Sysmond XPC Type Confusion Privilege Escalation
OS X suffers from a privilege escalation vulnerability due to XPC type confusion in sysmond.
Microsoft Releases February 2016 Security Bulletin
Original release date: February 09, 2016
Microsoft has released 13 updates to address vulnerabilities in Microsoft software. Exploitation of some of these vulnerabilities could allow a remote attacker to take control of an affected system.
Users and administrators are encouraged to review Microsoft Security Bulletins MS16-009 through MS16-022 and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Google Releases Security Update for Chrome
Original release date: February 09, 2016
Google has released Chrome version 48.0.2564.109 to address multiple vulnerabilities for Windows, Mac, and Linux. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
US-CERT encourages users and administrators to review the Chrome Releases page and apply the necessary update.
This product is provided subject to this Notification and this Privacy & Use policy.
CEBA-2016:0140 CentOS 6 httpd BugFix Update
CentOS Errata and Bugfix Advisory 2016:0140 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0140.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 5f1add7f698255f1219f6048fc929925711076c79400af243b8543ed572828cf httpd-2.2.15-47.el6.centos.2.i686.rpm 42b422488545690e24b1e35a091ac4a61f73be25babb35a8eed66fbbad22e3b0 httpd-devel-2.2.15-47.el6.centos.2.i686.rpm eca70b9bc3314c7f1b32be6779a4f13d6c8c3aee23eb9d24d9716b4736dd599f httpd-manual-2.2.15-47.el6.centos.2.noarch.rpm 35e16836eed1f15dc9edaa3bc831b78b3bdfbaf8c3a75cef83454db5eefa38b3 httpd-tools-2.2.15-47.el6.centos.2.i686.rpm 3acf2b5d65e7bee28ffac1c225f88695dedb083ce63d3fa1d41a77fa66e373b1 mod_ssl-2.2.15-47.el6.centos.2.i686.rpm x86_64: 7d2ffb2a1f1c1a48c3a9c43db10542e6345fa8cc2821f9ca075d72fc6226b0c2 httpd-2.2.15-47.el6.centos.2.x86_64.rpm 42b422488545690e24b1e35a091ac4a61f73be25babb35a8eed66fbbad22e3b0 httpd-devel-2.2.15-47.el6.centos.2.i686.rpm f279fa5f74d6fee985fd7589bc40984dba1127af4e13fd1137a7458e70d010eb httpd-devel-2.2.15-47.el6.centos.2.x86_64.rpm eca70b9bc3314c7f1b32be6779a4f13d6c8c3aee23eb9d24d9716b4736dd599f httpd-manual-2.2.15-47.el6.centos.2.noarch.rpm d9e24bf3eb5bdb4d692c8fe1707250c4efd485051a7103ec960b07b2e2f06501 httpd-tools-2.2.15-47.el6.centos.2.x86_64.rpm c3e793ddcb4f9bb9ad89b1f4d9bd182b2dfd98b2bedad6c4ce25c8feeca6f7a1 mod_ssl-2.2.15-47.el6.centos.2.x86_64.rpm Source: eff61018e9d2efbd5699d64825d4ebb8fe2e492f70dde1ea08a0416a82af629d httpd-2.2.15-47.el6.centos.2.src.rpm
CEBA-2016:0136 CentOS 6 httpd BugFix Update
CentOS Errata and Bugfix Advisory 2016:0136 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0136.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 4eaf1cbed674c7a1da99f48f306beccc18805873a1ec19ca9d3ac4033e7a7054 httpd-2.2.15-47.el6.centos.3.i686.rpm f2870eda1af2066dccd1c885b634c165ca57fe05d839bb916c2747df0ee4c3c4 httpd-devel-2.2.15-47.el6.centos.3.i686.rpm 9c812ec8277965da7fd803631accfb765f337797ab3ffab117fa162e8db6eb61 httpd-manual-2.2.15-47.el6.centos.3.noarch.rpm 95dbc5069bbcca57a673a8df92b88a7eb65e0bfc89f495acd39b35851d74953d httpd-tools-2.2.15-47.el6.centos.3.i686.rpm ff256a68391af5ad882635860208972c630bf2b6b8ddefd044374da38e85383c mod_ssl-2.2.15-47.el6.centos.3.i686.rpm x86_64: 046d6ef58c5f35a35f14496f86462ebd7fcb1e691e846c0285159009aabb8d94 httpd-2.2.15-47.el6.centos.3.x86_64.rpm f2870eda1af2066dccd1c885b634c165ca57fe05d839bb916c2747df0ee4c3c4 httpd-devel-2.2.15-47.el6.centos.3.i686.rpm 3e92898a5b28a0c94ff84363fb7bae7b57549b1e02f1e69bc402a6f97624a0f5 httpd-devel-2.2.15-47.el6.centos.3.x86_64.rpm 9c812ec8277965da7fd803631accfb765f337797ab3ffab117fa162e8db6eb61 httpd-manual-2.2.15-47.el6.centos.3.noarch.rpm a9d5c20095989ee43b1c49e97233cf92b86692760e494ec038b3ebe86cf6ce1d httpd-tools-2.2.15-47.el6.centos.3.x86_64.rpm 9be33b33188f440f2595f4d9511e40532b98bbc8ec1fd467330e9328b00ddf23 mod_ssl-2.2.15-47.el6.centos.3.x86_64.rpm Source: b8e08c972f702205b46622a0870523199fa41865dd69ac1802fcf6fc005323ec httpd-2.2.15-47.el6.centos.3.src.rpm
CEBA-2016:0134 CentOS 6 firefox BugFix Update
CentOS Errata and Bugfix Advisory 2016:0134 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0134.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 732d70ca9a967fcd57ca72070966871c2962d75daf354e353ec62f277ba5e801 firefox-38.6.0-2.el6.centos.i686.rpm x86_64: 732d70ca9a967fcd57ca72070966871c2962d75daf354e353ec62f277ba5e801 firefox-38.6.0-2.el6.centos.i686.rpm 970b53958a88395b0cdf9564fddcc953669449cfac05cb377b8208718977a78a firefox-38.6.0-2.el6.centos.x86_64.rpm Source: a26f1e526805cef57139007e5fee42e8e0fa1b1aad682337a0a9c56949923598 firefox-38.6.0-2.el6.centos.src.rpm
Adobe Releases Security Updates
Original release date: February 09, 2016
Adobe has released security updates to address vulnerabilities in Connect, Experience Manager, Flash Player, and Photoshop CC and Bridge CC. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Users and administrators are encouraged to review Adobe Security Bulletins APSB16-07, APSB16-05, APSB16-04 APSB16-03, and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
France Orders Facebook To Stop Tracking Non-Users or Face Fines
8th February 2016 would be considered as a cursed day in the history of Facebook. You might have known that just yesterday India bans Facebook’s Free Basic Internet in the country.
Now, Zuckerberg had got another bombshell in the form of a French Order from the European Data Protection Authority, who ordered Facebook to stop tracking non-users’ online activity and to stop data transfers of
![]()
Here's the Facebook Hacking Tool that Can Really Hack Accounts, But…
Yes, you heard me right.
A newly discovered Facebook hacking tool actually has the capability to hack Facebook account, but YOURS, and not the one you desire to hack.
How to Hack Facebook account? How to Hack my Girlfriends Facebook account? My boyfriend is cheating on me, How do I hack his Facebook Account?
<!– adsense –>
These are the queries that most of the Internet users search
![]()
