Grimbb version 1.3 suffers from a username and password hash disclosure vulnerability.
Monthly Archives: November 2016
ansible-2.2.0.0-3.el6
Add patch to fix dnf module groupinstall handling
—-
Update to new ansible 2.2 version.
For full changes see:
https://github.com/ansible/ansible/blob/stable-2.2/CHANGELOG.md
ansible-2.2.0.0-3.el7
Add patch to fix dnf module groupinstall handling
—-
Update to new ansible 2.2 version.
For full changes see:
https://github.com/ansible/ansible/blob/stable-2.2/CHANGELOG.md
ansible-2.2.0.0-3.fc24
Add patch to fix dnf module groupinstall handling
—-
Update to new ansible 2.2 version.
For full changes see:
https://github.com/ansible/ansible/blob/stable-2.2/CHANGELOG.md
ansible-2.2.0.0-3.fc25
Add patch to fix dnf module groupinstall handling
—-
Update to new ansible 2.2 version.
For full changes see:
https://github.com/ansible/ansible/blob/stable-2.2/CHANGELOG.md
Microsoft Internet Explorer 9 MSHTML CPtsTextParaclient::CountApes Out-Of-Bounds Read
Microsoft Internet Explorer 9 suffers from a MSHTML CPtsTextParaclient::CountApes out-of-bounds read vulnerability.
Re: [oss-security] CVE request:Lynx invalid URL parsing with '?'
Posted by Michal Zalewski on Nov 05
IIRC, RFC 3986 “fixes” that, and so does https://url.spec.whatwg.org/.
/mz
Over 1 Billion Mobile App Accounts can be Hijacked Remotely with this Simple Hack
Security researchers have discovered a way to target a huge number of Android and iOS apps that could allow them to remotely sign into any victim’s mobile app account without any knowledge of the victim.
A group of three researchers – Ronghai Yang, Wing Cheong Lau, and Tianyu Liu – from the Chinese University of Hong Kong has found [PPT] that most of the popular mobile apps that support
![]()
Re: [oss-security] CVE request:Lynx invalid URL parsing with '?'
Posted by Thomas Dickey on Nov 04
Actually, it does parse correctly. Go read RFC 1738.
What can be improved here is adding some warnings about a few of the cases
where users can be confused by legal URL syntax. I’m working on that.
MySQL / MariaDB / PerconaDB – Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )
Posted by Dawid Golunski on Nov 04
CVE-2016-6664 / (Oracle)CVE-2016-5617
Vulnerability: MySQL / MariaDB / PerconaDB – Root Privilege Escalation
Discovered by:
Dawid Golunski
@dawid_golunski
https://legalhackers.com
MySQL-based databases including MySQL, MariaDB and PerconaDB are affected
by a privilege escalation vulnerability which can let attackers who have
gained access to mysql system user (for example through CVE-2016-6663)
to further escalate their privileges to root user…
