This exploit gains remote code execution on Firefox 22-27 by abusing two separate privilege escalation vulnerabilities in Firefox's Javascript APIs.
d5cc945e074cb09855a57374de57a97262b3ec3bd1140179dace08bfcb49db35
This bulletin summary notes that MS14-045 has undergone a major revision increment as of August 27, 2014.
81b4c6695e127a3c88b4a69d1dce7b9431e665641f9a479bb33ffaf52b7885f8
ManageEngine DeviceExpert version 5.9 suffers from a user credential disclosure vulnerability.
51e22c92f98a813a1c5ec8301f8d7ed43adbe8dcd3be82e7f05dd0b625342ecf
The International Conference on Education Technologies and Computers (ICETC2014) will be held at Lodz University of Technology, Lodz, Poland on September 22-24, 2014.
961258d9a7a88a7e3de346c9f81e72d213430bf373f696e22bb1e383d448ea9b
ManageEngine EventLog Analyzer version 7.2.2 suffers from multiple reflective cross site scripting vulnerabilities.
0bf36f68da768952108b58e9e72774b2bf741922f4c175919319cf299d4fe76d
Debian Linux Security Advisory 3012-1 - Tavis Ormandy discovered a heap-based buffer overflow in the transliteration module loading code in eglibc, Debian's version of the GNU C Library. As a result, an attacker who can supply a crafted destination character set argument to iconv-related character conversation functions could achieve arbitrary code execution.
1fda609b5a3bc772a28814203d914f8516efd24910c2e122c8383a3dc3d5a4dd
Red Hat Security Advisory 2014-1102-01 - Ruby on Rails is a model-view-controller framework for web application development. Active Record implements object-relational mapping for accessing database entries using objects. It was discovered that Active Record's create_with method failed to properly check attributes passed to it. A remote attacker could possibly use this flaw to bypass the strong parameter protection and modify arbitrary model attributes via mass assignment if an application using Active Record called create_with with untrusted values. All ror40-rubygem-activerecord users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
2cd25f0dba5c66d9dc2d6f4a7e6c235747fedffc056844c7ef6d7252249588e3
Red Hat Security Advisory 2014-1101-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the way the ping_init_sock() function of the Linux kernel handled the group_info reference counter. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. A NULL pointer dereference flaw was found in the rds_ib_laddr_check() function in the Linux kernel's implementation of Reliable Datagram Sockets. A local, unprivileged user could use this flaw to crash the system.
c91898517a883dd6f082a85ce083d572bdff42dd7fb6a67daf132005f8cc8545
WooCommerce Store Exporter version 1.7.5 suffers from multiple persistent cross site scripting vulnerabilities.
a5d12f02986706a41c3f927c97bff470f809205d60722035a0a4da41540c4874
This script is designed to perform a security evaluation against industry best practices, over RedHat and RedHat based systems, to detect configuration deviations. It was developed due to the need to ensure that the servers within the author's workplace would comply with specific policies. As this tool was designed specifically for this purpose, "lynis" was not used for the task.
32e6a9c01f7cf352857b0a5a607d304b8c100b32f0166340a6a68c41595b9e97
Encore Discovery Solution version 4.3 suffers from an open redirect vulnerability. It also passes the session token in the URL.
e0920eb1e2d0150ca74c5e507a7c2eac753594fae2d4c3fb55d5150e27fe6b15
The subtle way in which the IPv6 and IPv4 protocols coexist in typical networks, together with the lack of proper IPv6 support in popular Virtual Private Network (VPN) tunnel products, may inadvertently result in VPN tunnel traffic leakages. That is, traffic meant to be transferred over an encrypted and integrity- protected VPN tunnel may leak out of such a tunnel and be sent in the clear on the local network towards the final destination. This document discusses some scenarios in which such VPN tunnel traffic leakages may occur as a result of employing IPv6-unaware VPN software. Additionally, this document offers possible mitigations for this issue.
fa98023a273f3231dab648bba72fdf7f52dd2a529b75297420d89773222e1c25
Furniture Site Manager suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.
eed7a3816e2b07e5e69779e732c4e7fb71add6fcbc27a1090a52dcf96ec86c59