IBM Personal Communications (aka PCOMM) 6.x before 6.0.17 and 12.x before 12.0.0.1 does not properly restrict credential extraction, which allows local users to discover passwords by leveraging access to the victim account and executing a PowerShell script.
Monthly Archives: July 2016
CVE-2016-0393
IBM Maximo Asset Management 7.5 before 7.5.0.10-TIV-MBS-IFIX002 and 7.6 before 7.6.0.5-TIV-MAMMT-FP001 allows remote attackers to obtain sensitive URL information by reading log files.
CVE-2016-1448
Cross-site request forgery (CSRF) vulnerability in Cisco WebEx Meetings Server 2.7 allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuy92706.
CVE-2016-1459
Cisco IOS 12.4 and 15.0 through 15.5 and IOS XE 3.13 through 3.17 allow remote authenticated users to cause a denial of service (device reload) via crafted attributes in a BGP message, aka Bug ID CSCuz21061.
CVE-2016-3039
IBM Traveler 8.x and 9.x before 9.0.1.12 allows remote authenticated users to read arbitrary files or cause a denial of service (memory consumption) via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Clear Voyager Hotspot IMW-C910W File Disclosure
Clear Voyager Hotspot IMW-C910W suffers from a file disclosure vulnerability.
Vodafone EasyBox 804 Denial Of Service / Authentication Bypass
Vodafone EasyBox 804 suffers from authentication bypass and denial of service vulnerabilities.
OpenDNSSEC 2.0.0-1
OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
Here's How Riffle Anonymity Network Protects Your Privacy better than Tor
Online privacy is an Internet buzzword nowadays. If you are also concerned about the privacy of your web surfing, the most efficient way is to use TOR – a free software that lets users communicate anonymously by hiding their actual location from snoopers.
Although TOR is a great anonymous network, it has some limitations that could still allow a motivated hacker to compromise the anonymity of
![]()
Bugtraq: [SECURITY] [DSA 3619-1] libgd2 security update
[SECURITY] [DSA 3619-1] libgd2 security update
