QEMU ‘Transmit(tx) Queue’ Processing Information Disclosure Vulnerability
Monthly Archives: August 2016
Vuln: Libav 'resample.c' Heap Based Buffer Overflow Vulnerability
Libav ‘resample.c’ Heap Based Buffer Overflow Vulnerability
GNU Privacy Guard 1.4.21
GnuPG (the GNU Privacy Guard or GPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
Red Hat Security Advisory 2016-1625-02
Red Hat Security Advisory 2016-1625-02 – This release of Red Hat JBoss Core Services Service Pack 1 serves as a replacement for JBoss Core Services Apache HTTP Server. Security Fix: It was discovered that Apache HTTP Server used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.
Red Hat Security Advisory 2016-1624-01
Red Hat Security Advisory 2016-1624-01 – This release of Red Hat JBoss Web Server 3.0.3 Service Pack 1 serves as a update for Red Hat JBoss Web Server 3.0.3 httpd and tomcat. Security Fix: It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.
NSA website goes down as hackers auction stolen ‘cyber weapons’
If you try to visit the NSA’s website right now, you’re in for a big disappointment.
The post NSA website goes down as hackers auction stolen ‘cyber weapons’ appeared first on WeLiveSecurity.
![]()
Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers
Cisco today acknowledged two vulnerabilities in its Adaptive Security Appliance that were leaked in the ShadowBrokers data dump of Equation Group exploits.
Bugtraq: [SYSS-2016-067] NetIQ Access Manager (iManager) – Temporary Second Order Cross-Site Scripting (CWE-79)
[SYSS-2016-067] NetIQ Access Manager (iManager) – Temporary Second Order Cross-Site Scripting (CWE-79)
Bugtraq: Cisco Security Advisory: Cisco Firepower Management Center Remote Command Execution Vulnerability
Cisco Security Advisory: Cisco Firepower Management Center Remote Command Execution Vulnerability
Bugtraq: Cisco Security Advisory: Cisco Firepower Management Center Privilege Escalation Vulnerability
Cisco Security Advisory: Cisco Firepower Management Center Privilege Escalation Vulnerability