HP Security Bulletin HPSBMU02895 SSRT101253 4 – Potential security vulnerabilities have been identified with HP Data Protector. These vulnerabilities could be remotely exploited to allow an increase of privilege, create a Denial of Service (DoS), or execute arbitrary code. Revision 4 of this advisory.
Category Archives: Security
Security
Kmart Shops Hit By Payment Card Hack Attack
Android's Cyanogenmod Open To MitM Attacks
Safecrackers Cost Cracked With $150 Widget
These Are The Emails Snowden Sent To First Introduce His Epic NSA Leaks
PayPal Inc BB #85 MB iOS 4.6 – Auth Bypass Vulnerability
Posted by Vulnerability Lab on Oct 13
Document Title:
===============
PayPal Inc BB #85 MB iOS 4.6 – Auth Bypass Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=895
PayPal Security UID: Vxda0S
Video: http://www.vulnerability-lab.com/get_content.php?id=1338
View: https://www.youtube.com/watch?v=RXubXP_r2M4
Release Date:
=============
2014-10-09
Vulnerability Laboratory ID (VL-ID):
====================================…
Paypal Community Help Forums Cross Site Scripting
Paypal Community Help Forums suffered from a cross site scripting vulnerability.
Etiko CMS Cross Site Scripting / SQL Injection
Etiko CMS suffers from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.
CVE-2014-7283
The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the xfs implementation in the Linux kernel before 3.14.2 does not properly compare btree hash values, which allows local users to cause a denial of service (filesystem corruption, and OOPS or panic) via operations on directories that have hash collisions, as demonstrated by rmdir operations.
CVE-2014-7284
The net_get_random_once implementation in net/core/utils.c in the Linux kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote attackers to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numbers, TCP and UDP port numbers, and IP ID values.