libxml2 CVE-2016-3705 Stack Buffer Overflow Vulnerability
Monthly Archives: September 2016
Vuln: Libxml2 'xmlParseName' CVE-2016-4447 Remote Denial of Service Vulnerability
Libxml2 ‘xmlParseName’ CVE-2016-4447 Remote Denial of Service Vulnerability
Vuln: Apache Struts CVE-2016-3093 Denial of Service Vulnerability
Apache Struts CVE-2016-3093 Denial of Service Vulnerability
HP Security Bulletin HPSBGN03650 1
HP Security Bulletin HPSBGN03650 1 – A potential vulnerability has been identified in HPE Network Automation Software. The vulnerability could be locally exploited to allow arbitrary file modification. Revision 1 of this advisory.
Ubuntu Security Notice USN-3094-1
Ubuntu Security Notice 3094-1 – Andrew Ayer discovered that Systemd improperly handled zero-length notification messages. A local unprivileged attacker could use this to cause a denial of service.
Red Hat Security Advisory 2016-1967-01
Red Hat Security Advisory 2016-1967-01 – The Red Hat Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning. The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer Application Programming Interface.
Red Hat Security Advisory 2016-1978-01
Red Hat Security Advisory 2016-1978-01 – Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Security Fix: It was discovered that python-twisted-web used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.
Red Hat Security Advisory 2016-1973-01
Red Hat Security Advisory 2016-1973-01 – Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix: A flaw was found in Ceph RGW code which allows an anonymous user to list contents of RGW bucket by bypassing ACL which should only allow authenticated users to list contents of bucket.
Red Hat Security Advisory 2016-1972-01
Red Hat Security Advisory 2016-1972-01 – Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix: A flaw was found in Ceph RGW code which allows an anonymous user to list contents of RGW bucket by bypassing ACL which should only allow authenticated users to list contents of bucket.
KeepNote 0.7.8 Remote Command Execution
Posted by Rio Sherri on Sep 29
# Title : KeepNote 0.7.8 Remote Command Execution
# Date : 29/09/2016
# Author : R-73eN
# Twitter : https://twitter.com/r_73en
# Tested on : KeepNote 0.7.8 (Kali Linux , and Windows 7)
# Software : http://keepnote.org/index.shtml#download
# Vendor : ~
#
# DESCRIPTION:
#
# When the KeepNote imports a backup which is actuallt a tar.gz file
doesn’t checks for ” ../ ” characters
# which makes it possible to do a path traversal and…