WordPress Content Text Slider on Post plugin version 6.8 suffers from a cross site scripting vulnerability.
Monthly Archives: December 2015
Western Union Cross Site Scripting
The Vulnerability Laboratory Core Research Team discovered a client side cross site scripting web vulnerability in the official Western Union China web application.
DELL Scrutinizer 12.0.3 Cross Site Scripting
DELL Scrutinizer version 12.0.3 suffers from a persistent script insertion vulnerability.
Microsoft Windows win32k Local Privilege Escalation
Microsoft Windows win32k local privilege escalation exploit that leverages the vulnerability detailed in MS15-010.
POP Peeper 4.0.1 Code Execution
POP Peeper version 4.0.1 suffers from a code execution vulnerability.
HP Security Bulletin HPSBHF03419 1
HP Security Bulletin HPSBHF03419 1 – A potential security vulnerability has been identified in HP Network Products including some H3C routers and switches. This is a Virtual routing and forwarding (VRF) hopping vulnerability that could be exploited remotely resulting in Denial of Service (DoS) or unauthorized access. Revision 1 of this advisory.
Red Hat Security Advisory 2015-2694-01
Red Hat Security Advisory 2015-2694-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU’s AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.
Red Hat Security Advisory 2015-2695-01
Red Hat Security Advisory 2015-2695-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU’s AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.
Red Hat Security Advisory 2015-2696-01
Red Hat Security Advisory 2015-2696-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU’s AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.
CESA-2015:2694 Important CentOS 6 qemu-kvmSecurity Update
CentOS Errata and Security Advisory 2015:2694 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-2694.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: b696390d8917ac773ee6aec7aea75dc0b45e05987ef9d75af804fc55ee4c1beb qemu-guest-agent-0.12.1.2-2.479.el6_7.3.i686.rpm x86_64: 84f0bb42e2a41afb55ef562f922c1cf3930c2e6693c461f3f0e437b37616e2dc qemu-guest-agent-0.12.1.2-2.479.el6_7.3.x86_64.rpm 5fec2687a04c15616dee3d8bc3461783e3e32ec9e665a103242a14d9cfc1ca0a qemu-img-0.12.1.2-2.479.el6_7.3.x86_64.rpm 2d8f0b102815b4d4d3b33daa489d31879bea053d1f391ef280b5aaedb1198b34 qemu-kvm-0.12.1.2-2.479.el6_7.3.x86_64.rpm 26d6611cbece4dc9fb708a57c4051129059b407704b6367ec2744be3883d3d26 qemu-kvm-tools-0.12.1.2-2.479.el6_7.3.x86_64.rpm Source: d66c3e7a3148aac6f2c8925c8e48829429bd1cc856ece2ca8d30626145028f83 qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm