Quan Nguyen discovered that a missing boundary check in the
Galois/Counter mode implementation of Bouncy Castle (a Java
implementation of cryptographic algorithms) may result in information
disclosure.
Monthly Archives: April 2017
Vuln: Mozilla Firefox and Thunderbird CVE-2017-5398 Multiple Unspecified Memory-Corruption Vulnerabilities
Mozilla Firefox and Thunderbird CVE-2017-5398 Multiple Unspecified Memory-Corruption Vulnerabilities
Vuln: Foreman CVE-2017-2672 Information Disclosure Vulnerability
Foreman CVE-2017-2672 Information Disclosure Vulnerability
Vuln: Microsoft Office OLE Feature Remote Code Execution Vulnerability
Microsoft Office OLE Feature Remote Code Execution Vulnerability
Vuln: Bluecoat SSL Visibility CVE-2016-10259 Denial of Service Vulnerability
Bluecoat SSL Visibility CVE-2016-10259 Denial of Service Vulnerability
kernel-4.10.9-100.fc24
The 4.10.9 stable kernel update contains a number of important fixes across the tree.
kernel-4.10.9-200.fc25
The 4.10.9 stable kernel update contains a number of important fixes across the tree.
CVE-2017-7646
SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4 allows an authenticated user to browse the server’s filesystem and read the contents of arbitrary files contained within.
CVE-2017-7647
SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4 allows an authenticated user to execute arbitrary commands.
CVE-2016-8237
Remote code execution in Lenovo Updates (not Lenovo System Update) allows man-in-the-middle attackers to execute arbitrary code.