Siemens SINEMA Remote Connect Server CVE-2016-6204 Cross Site Scripting Vulnerability
Monthly Archives: July 2016
Vuln: Siemens SIMATIC NET PC-Software CVE-2016-5874 Remote Denial of Service Vulnerability
Siemens SIMATIC NET PC-Software CVE-2016-5874 Remote Denial of Service Vulnerability
Vuln: Apache Struts CVE-2016-0785 Remote Code Execution Vulnerability
Apache Struts CVE-2016-0785 Remote Code Execution Vulnerability
Vuln: Apache Struts CVE-2016-2162 Cross Site Scripting Vulnerability
Apache Struts CVE-2016-2162 Cross Site Scripting Vulnerability
Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (2)
This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware Version <= 8.0.1.007 and Load Balancer Firmware <= v5.4.0.004 by exploiting a two vulnerabilities in the web administration interface. The first bug leverages a Arbitrary File Upload vulnerability to create a malicious file containing shell commands before using a second bug meant to clean up left-over core files on the device to execute them. By sending a specially crafted requests it’s possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.
CESA-2016:1486 Moderate CentOS 7 samba SecurityUpdate
CentOS Errata and Security Advisory 2016:1486 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1486.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: af316ded6583e6970f213f1faa30a355594d2933f688a907ce565d564e40cdca ctdb-4.2.10-7.el7_2.x86_64.rpm 936138ac2d66d5989658814b31b59486ab276537345393408de3efdb78431cce ctdb-devel-4.2.10-7.el7_2.i686.rpm 2437457d7d9812367bbd51f8c6517a9a9d15c529d1d5983ece129f8f459bab8a ctdb-devel-4.2.10-7.el7_2.x86_64.rpm e714cab79fe0103cd66ddbd46ae74c68e84cdbd7ffe0a34d1efa5b38b9ff1ffc ctdb-tests-4.2.10-7.el7_2.x86_64.rpm eb97c7a86e94546b1180f9ab367121a16a486bd366ae12c6e468d561b2d12f48 libsmbclient-4.2.10-7.el7_2.i686.rpm 67f1de3814404a15e92b9787b058ec92a4db857ef761d8b57fc0352f94ab180b libsmbclient-4.2.10-7.el7_2.x86_64.rpm 323283146f2e2d90737dffc367f747e414fd368d6ecf692369501ca2fd97359e libsmbclient-devel-4.2.10-7.el7_2.i686.rpm 0844d470c626f3054dc2d75a9ec6f49732ea6dfe585391a40d14553310626418 libsmbclient-devel-4.2.10-7.el7_2.x86_64.rpm e48e898aca04edd11ccc3a162d6c62e29a0b0f1d039be2f38b680b640671dff4 libwbclient-4.2.10-7.el7_2.i686.rpm 2b8df119f520e430163bf32247d177b2d1d51b8179c6dcbdc8b7fc7d47bbc28c libwbclient-4.2.10-7.el7_2.x86_64.rpm 3ccc0bf2449d3b9fdd7ffdb5d7f1cef0190d5f30a02e2a7622e0df31afdf7fb5 libwbclient-devel-4.2.10-7.el7_2.i686.rpm a4a4ce957fe9d636ee6caa9fbab1b1c7f295768d03acfcdbadc1dee1bd4608c3 libwbclient-devel-4.2.10-7.el7_2.x86_64.rpm f5c64b664496854190fc63f88afdea510e879e4e4f46ebc0d8b4480f34315157 samba-4.2.10-7.el7_2.x86_64.rpm 3bdfe254ea4e1461fb55476cd9cf69a08a38b76dc0386ec5044344c5fc815782 samba-client-4.2.10-7.el7_2.x86_64.rpm 06041291bbacaa65968e5c15e65d7fb28846840b192139581d9aa19bf6d05beb samba-client-libs-4.2.10-7.el7_2.i686.rpm 8c31c60f8cc270b7e86d4b5f7dd3c3db9c060e5e75673b3a3337eb6420b93855 samba-client-libs-4.2.10-7.el7_2.x86_64.rpm 622825dd58550cf8e98d247d079f82e3d2c2d44333f7193ba7b1e637a15c83cf samba-common-4.2.10-7.el7_2.noarch.rpm d24f24bb3964e31cd59c69df78bfeefeca1c75a134174df0be364757b1b33888 samba-common-libs-4.2.10-7.el7_2.x86_64.rpm 79d46ce115fa8a5ed8dff5323f9fcd48380d53eb5b215461359b2f7b5adf7364 samba-common-tools-4.2.10-7.el7_2.x86_64.rpm 0e2649cb2ffa3cc1bc46adc717398302fafd19505920d670dcc19d765115ba82 samba-dc-4.2.10-7.el7_2.x86_64.rpm 017330cf223292625dbc706174271ea578c6873b2d41fa0e861e78c6c4b6b5a0 samba-dc-libs-4.2.10-7.el7_2.x86_64.rpm 29070202ccdd99d8658e87c71ce712f1f06d5cc3534b4d90990ab41a0e4cd369 samba-devel-4.2.10-7.el7_2.i686.rpm 4e03c1dfc3ecc77687cfeb51990634bdcbdc5768d92bf950815c831a7e40f585 samba-devel-4.2.10-7.el7_2.x86_64.rpm 976eac8aa4c6ef40fa3308507e7c57531fd305c0ea9426a8b95409f8e18e62aa samba-libs-4.2.10-7.el7_2.i686.rpm 7c3994acb7c3a4d0a2522b042f77a87e9220fc4f458b7cce8dd3f60fc2b614ca samba-libs-4.2.10-7.el7_2.x86_64.rpm d1f892959838210f6f63f7dc892068e5bde85dea22ec14db0a97b084501cb306 samba-pidl-4.2.10-7.el7_2.noarch.rpm 1f926bf228383a34160a83ab1f90aa4ff8c8e54cff12cba2f558f0725b30e76e samba-python-4.2.10-7.el7_2.x86_64.rpm 5ffff01abf79e9328726d7029e3a638ff5782aa43b2d9de433c4d5814fc444fe samba-test-4.2.10-7.el7_2.x86_64.rpm e4f4067424a3ac0370a8566871a82f4edb32e9baa398b977792f3f0b57b5715f samba-test-devel-4.2.10-7.el7_2.x86_64.rpm b507771944911796d6c59ec48f88af307260e19b3836d228cfdfd358969d59bf samba-test-libs-4.2.10-7.el7_2.i686.rpm aa964f62ae380e44cd124a25368824748e5d20e55102415068ffb9ba697c65a6 samba-test-libs-4.2.10-7.el7_2.x86_64.rpm 697eb0bcb08507645e0a1978a29ca134c3b7fd71fb9e77a6b887adcd8ecd92da samba-vfs-glusterfs-4.2.10-7.el7_2.x86_64.rpm 107884a502a8e44131bd7aeeba02317d211b0a52c37a7154441e48ca1cdad693 samba-winbind-4.2.10-7.el7_2.x86_64.rpm acb9021d7339bf06f64b91701082181a1cb1679349c14b47a58c73d7b5cb77a3 samba-winbind-clients-4.2.10-7.el7_2.x86_64.rpm 312cf5c2e79134cb905b6ce69867ee7935889349841ff30108242117225fc9d4 samba-winbind-krb5-locator-4.2.10-7.el7_2.x86_64.rpm 9045f7ec36fc584fc0051f7e42a546df2c347a167de3a73869e6a7c9d8c5ee15 samba-winbind-modules-4.2.10-7.el7_2.i686.rpm adf85c04209ca4ed846c8529df8d7fde3148e40d4c2bd635f557e9fc41c3ad4a samba-winbind-modules-4.2.10-7.el7_2.x86_64.rpm Source: 2ea1482b434b0a735289ccb72fcff96b31a10bdeca0d9529bb9bfefd8e12c651 samba-4.2.10-7.el7_2.src.rpm
Debian Security Advisory 3629-1
Debian Linux Security Advisory 3629-1 – Several vulnerabilities were discovered in the Network Time Protocol daemon and utility programs.
Bamboo Deserialization Issue
This advisory discloses a critical severity security vulnerability which was introduced in version 2.3.1 of Bamboo. Versions of Bamboo starting with 2.3.1 before 5.11.4.1 (the fixed version for 5.11.x) and from 5.12.0 before 5.12.3.1 (the fixed version for 5.12.x) are affected by this vulnerability.
Cross-Site Scripting vulnerability in ColorWay WordPress Theme
Posted by Summer of Pwnage on Jul 26
————————————————————————
Cross-Site Scripting vulnerability in ColorWay WordPress Theme
————————————————————————
Yorick Koster, July 2016
————————————————————————
Abstract
————————————————————————
Multiple Cross-Site Scripting vulnerabilities were found in…
CVE-2015-5738
The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.