A850 Telemetry Gateway Base Station CVE-2016-2274 Cross Site Scripting Vulnerability
Monthly Archives: December 2016
Vuln: Sauter NovaWeb Web HMI CVE-2016-5782 Authentication Bypass Vulnerability
Sauter NovaWeb Web HMI CVE-2016-5782 Authentication Bypass Vulnerability
Vuln: Multiple Moxa MiiNePort Products Information Disclosure and Security Bypass Vulnerabilities
Multiple Moxa MiiNePort Products Information Disclosure and Security Bypass Vulnerabilities
Gentoo Linux Security Advisory 201612-20
Gentoo Linux Security Advisory 201612-20 – A buffer overflow in jq might allow remote attackers to execute arbitrary code. Versions less than 1.5-r2 are affected.
Gentoo Linux Security Advisory 201612-21
Gentoo Linux Security Advisory 201612-21 – Multiple vulnerabilities were found in SQLite, the worst of which may allow execution of arbitrary code. Versions less than 3.11.1 are affected.
Gentoo Linux Security Advisory 201612-22
Gentoo Linux Security Advisory 201612-22 – A vulnerability in Coreutils could lead to the execution of arbitrary code or a Denial of Service condition. Versions less than 8.23 are affected.
Gentoo Linux Security Advisory 201612-23
Gentoo Linux Security Advisory 201612-23 – Multiple vulnerabilities have been found in socat, the worst of which may allow execution of arbitrary code. Versions less than 1.7.3.1 are affected.
Gentoo Linux Security Advisory 201612-24
Gentoo Linux Security Advisory 201612-24 – Multiple vulnerabilities were found in Binutils, the worst of which may allow execution of arbitrary code. Versions less than 2.25 are affected.
HP Security Bulletin HPSBHF03674 1
HP Security Bulletin HPSBHF03674 1 – A potential security vulnerability in the DES/3DES block ciphers could potentially impact HPE Comware 5 and Comware 7 network products using SSL/TLS. This vulnerability could be exploited remotely resulting in disclosure of information. Revision 1 of this advisory.
Ubuntu Security Notice USN-3154-1
Ubuntu Security Notice 3154-1 – It was discovered that OpenJDK did not restrict the set of algorithms used for Jar integrity verification. An attacker could use this to modify without detection the content of a JAR file, affecting system integrity. It was discovered that the JMX component of OpenJDK did not sufficiently perform classloader consistency checks. An attacker could use this to bypass Java sandbox restrictions. Various other issues were also addressed.