IBM InfoSphere Information Server contains a Path-relative stylesheet import vulnerability that allows attackers to render a page in qirks mode thereby facilitating an attacker to inject malicious CSS.
Monthly Archives: February 2017
CVE-2016-9704
IBM Security Identity Manager Virtual Appliance is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2016-9008
IBM UrbanCode Deploy could allow a malicious user to access the Agent Relay ActiveMQ Broker JMX interface and run plugins on the agent.
CVE-2016-8977
IBM BigFix Inventory v9 could disclose sensitive information to an unauthorized user using HTTP GET requests. This information could be used to mount further attacks against the system.
CVE-2016-8982
IBM InfoSphere Information Server stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history.
CVE-2016-9739
IBM Security Identity Manager Virtual Appliance stores user credentials in plain in clear text which can be read by a local user.
CVE-2016-9703
IBM Security Identity Manager Virtual Appliance does not invalidate session tokens which could allow an unauthorized user with physical access to the work station to obtain sensitive information.
CVE-2016-9000
IBM InfoSphere DataStage is vulnerable to cross-frame scripting, caused by insufficient HTML iframe protection. A remote attacker could exploit this vulnerability using a specially-crafted URL to navigate to a web page the attacker controls. An attacker could use this vulnerability to conduct clickjacking or other client-side browser attacks.
runc-1.0.0-5.rc2.gitc91b5be.fc24
depend on criu for checkpoint/restore
—-
Resolves: #1412238 – *CVE-2016-9962* – set init processes as non-dumpable,
—-
patch to enable seccomp
—-
Resolves: #1342707 – bump to v1.0.0-rc1
Ransomware attacks hotel computer and keycard system
The Romantik Seehotel Jäger, sitting serenly for 111 years in the picturesque Austrian Alps, fell victim to a ransomware attack. At the height of the winter ski season, cybercriminals took control of the hotel’s computer system and demanded $1,603 in bitcoins to release reservations and the system to program electronic keys used by guests to access their rooms.
![]()