Eclipse Birt Report Viewer versions 4.5.0 and below suffer from a persistent cross site scripting vulnerability.
69a4754bb354b6494f39716677edb9890c7c5c0beb35f24950e1109deed68f22
A buffer overflow vulnerability exists in SAP HANA interface. If an attacker has a network access to the SQL interface or the SAP HANA Extended Application Services interface of an SAP HANA system, the vulnerability enables the attacker to inject code into the working memory that is subsequently executed by the application. It can also be used to cause a general fault in the product causing the product to terminate.
4a3217c857218fca063182a533106637a286820d37a2c8dbd3fe6da700dfe2ad
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada. For 2016 it will be held June 17th through the 19th and the Call For Papers has been announced.
1bacbaa5d695c99c37519aaa6a6410074cf9a3f201df1a9fbb1257731de08d7f
Ubuntu Security Notice 2877-1 - A bad cast was discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. An issue was discovered when initializing the UnacceleratedImageBufferSurface class in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information. Various other issues were also addressed.
aab8df13dc9b776b7c26a05ccd6eaddbcf4b892adbc9b482528491a49bf05d93
Gentoo Linux Security Advisory 201601-3 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 11.2.202.559 are affected.
b8c52d90e2d0336f1f246283e0e308d85d2986a86017a06c3029d79fbee82b35
Ubuntu Security Notice 2880-1 - Bob Clary, Christian Holler, Nils Ohlmeier, Gary Kwong, Jesse Ruderman, Carsten Book, Randell Jesup, Nicolas Pierron, Eric Rescorla, Tyson Smith, and Gabor Krizsanits discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Gustavo Grieco discovered an out-of-memory crash when loading GIF images in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could exploit this to cause a denial of service. Various other issues were also addressed.
15dcb61b640228ff99b99cf47350fa53304f54f58f8616c179264e04e1b8ed38
Gentoo Linux Security Advisory 201601-2 - Multiple vulnerabilities have been found in WebKitGTK+, allowing remote attackers to execute arbitrary code or cause a Denial of Service condition. Versions less than 2.4.9 are affected.
f3a5025bfb0304bda37a58157d49dc12fa3b3ccb0643fbfd5c1f28f0eba464cb
Debian Linux Security Advisory 3456-1 - Several vulnerabilities were discovered in the chromium web browser.
ab15479803fcbef943a792cd959048ad997c63adae4e56ba5a338c70faaacb9e
Red Hat Security Advisory 2016-0074-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List records. A remote, authenticated attacker could use this flaw to cause named to crash.
03f7bbfa2b18a4a3b83bbffd6ed34a4d48ec454bf9244aad45716be05882f8d3
Red Hat Security Advisory 2016-0073-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List records. A remote, authenticated attacker could use this flaw to cause named to crash.
0db5e96fc5a1c32ba00ccd1a8a3d18015f269e554da1d8b34e329b5755e2b83b
Red Hat Security Advisory 2016-0072-01 - Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. All Chromium users should upgrade to these updated packages, which contain Chromium version 48.0.2564.82, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.
1f7e8b8443509ecf1ca8eb1f131d227bb7c7e3f6216070fc81adf21bb3594a19
Debian Linux Security Advisory 3455-1 - Isaac Boukris discovered that cURL, an URL transfer library, reused NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for the new transfer. This could lead to HTTP requests being sent over the connection authenticated as a different user.
3620e17695b64ca3c1d71e402b5865252838bb7f40fb0095351f1bce3684e807
Red Hat Security Advisory 2016-0070-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. The following security issues are addressed with this release: An authorization flaw was discovered in Kubernetes; the API server did not properly check user permissions when handling certain requests. An authenticated remote attacker could use this flaw to gain additional access to resources such as RAM and disk space.
e73b61bb8856329558f3b1fe6a7f3f2ec02da96fe2e70154bb79cba5ab14ce31
FreeBSD Security Advisory - A programming error in the Linux compatibility layer could cause the issetugid(2) system call to return incorrect information. If an application relies on output of the issetugid(2) system call and that information is incorrect, this could lead to a privilege escalation.
2462fca5abf2f3ca47e35945821727dadf6171021ac17e978ce0410a5ed2e46b
FreeBSD Security Advisory - Multiple vulnerabilities have been discovered in ntp 4.2.8p5.
0012bd57d2a8406dd32930fabf358096ce959163c75bbf46f91070e3e7c213d8
FreeBSD Security Advisory - There is an off-by-one error in a buffer size check when performing certain string formatting operations. Slaves using text-format db files could be vulnerable if receiving a malformed record in a zone transfer from their master. Masters using text-format db files could be vulnerable if they accept a malformed record in a DDNS update message. Recursive resolvers are potentially vulnerable when debug logging is enabled and if they are fed a deliberately malformed record by a malicious server. A server which has cached a specially constructed record could encounter this condition while performing 'rndc dumpdb'.
c803a5067169b0dd06a8b595f07a796ef604d725b2cec7e9041f63d8bdb30a0a
Debian Linux Security Advisory 3454-1 - Multiple vulnerabilities have been discovered in VirtualBox, an x86 virtualisation solution.
136e69f73fdf63ba39f28da933af0cb4bc9773576e34a8eca44649ebf4d8bee2
Gentoo Linux Security Advisory 201601-4 - Multiple vulnerabilities have been found in OpenSMTPD, the worst allowing remote attackers to execute arbitrary code. Versions less than 5.7.3_p1 are affected.
d62d01579964fac63bf4746a32bf41e5b67100440041d0086c611de45fba65c2
Red Hat Security Advisory 2016-0071-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox.
0707aeb8d6d66c6d6ac2cd338c1d1bbb3165a2c608c22b2298f846bd5f9cf289
Red Hat Security Advisory 2016-0069-01 - In accordance with the Red Hat CloudForms Support Life Cycle Policy, support will end on April 10, 2016. Red Hat will not provide extended support for this product.
a08df67f5b9ac459e1707c0ed2c561f2940ec67b6c4b71c7fa0bbb9fb5030297
A Linux IPv4 firewall and traffic shaper for single hosts to small and mid-sized networks. It allows flexible rule creation, while also shipping with presets for common needs. Rules are written in simple XML, allowing various ways to group and nest the iptables arguments. An interactive mode is available in order to build configuration files in a wizard based manner. Extensive documentation is also included.
7ea58743d02ee926623f928ac586bd8f6713d712bf79215153e65bcee7689737
The iOS kernel suffers from a use-after-free vulnerability in IOHIDEventService.
0993c62c9d7d3b84cf8014c889265e8630d8eb77eb33686a24adc235d64af0f7
Pdfium suffers from a heap-based out-of-bounds read in Opj_j2k_read_mcc (libopenjpeg).
9e967851534fd579d0655685231a3b3e4c133231434770867bb38de1686a32dc
Secure Item Hub version 1.0 suffers from input validation, code execution, and remote file upload vulnerabilities.
61146d0cd8a7b0ba1c76aa4c5ec50ae4a0936a2ce0c891375912179cb52e8ee4
This proof of concept demonstrates the Android Libstagefright heap buffer overflow that occurs due to an integer overflow in MP3 ID3 tag parsing.
09894a423a096a40f949655278d8dd3129cf6b5cfb77897fe3b2873fd160d9ef