Apple Patches Bash Vulnerability On Macs
Snapchat Hit By Weightloss Spam Scam
Hacker Ports Minecraft To Android Wear Smartwatch
Moab Insecure Message Signing Authentication Bypass
Moab suffers from an insecure message signing authentication bypass vulnerability. All versions up to 8 can be affected depending on the configuration.
Moab User Impersonation
Moab versions prior to 7.2.9 and 8 suffer from a user impersonation vulnerability.
Moab Dynamic Configuration Authentication Bypass
Moab versions prior to 7.2.9 and 8 suffer from a dynamic reconfiguration authentication bypass issue that allows for remote code execution.
IPFire 2.15 Bash Command Injection
IPFire versions 2.15 and below core 82 authenticated CGI remote command injection exploit that leverages the bash vulnerability.
HP Network Node Manager I PMD Buffer Overflow
This Metasploit module exploits a stack buffer overflow in HP Network Node Manager I (NNMi). The vulnerability exists in the pmd service, due to the insecure usage of functions like strcpy and strcat while handling stack_option packets with user controlled data. In order to bypass ASLR this module uses a proto_tbl packet to leak an libov pointer from the stack and finally build the rop chain to avoid NX.
Red Hat Security Advisory 2014-1319-01
Red Hat Security Advisory 2014-1319-01 – Apache Xerces for Java is a high performance, standards compliant, validating XML parser written in Java. The xerces-j2 packages provide Xerces-J version 2. A resource consumption issue was found in the way Xerces-J handled XML declarations. A remote attacker could use an XML document with a specially crafted declaration using a long pseudo-attribute name that, when parsed by an application using Xerces-J, would cause that application to use an excessive amount of CPU. All xerces-j2 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the Xerces-J must be restarted for this update to take effect.