Apple Security Advisory 2019-1-22-2
Apple Security Advisory 2019-1-22-2 - macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra are now available and addresses buffer overflow, code execution, and...
View ArticleApple Security Advisory 2019-1-22-3
Apple Security Advisory 2019-1-22-3 - watchOS 5.1.3 is now available and addresses buffer overflow, code execution, and denial of service vulnerabilities.
View ArticleSlackware Security Advisory - httpd Updates
Slackware Security Advisory - New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
View ArticleUbuntu Security Notice USN-3707-2
Ubuntu Security Notice 3707-2 - USN-3707-1 and USN-3349-1 fixed several vulnerabilities in NTP. This update provides the corresponding update for Ubuntu 12.04 ESM. Miroslav Lichvar discovered that NTP...
View ArticleRed Hat Security Advisory 2019-0148-01
Red Hat Security Advisory 2019-0148-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual...
View ArticleUbuntu Security Notice USN-3867-1
Ubuntu Security Notice 3867-1 - Multiple security issues were discovered in MySQL and this update includes a new upstream MySQL version to fix these issues. Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and...
View ArticleUbuntu Security Notice USN-3866-1
Ubuntu Security Notice 3866-1 - Tavis Ormandy discovered that Ghostscript incorrectly handled certain PostScript files. If a user or automated system were tricked into processing a specially crafted...
View ArticleJoomla! vWishlist 1.0.1 SQL Injection
Joomla! vWishlist component version 1.0.1 suffers from a remote SQL injection vulnerability.
View ArticleJoomla! vAccount 2.0.2 SQL Injection
Joomla! vAccount component version 2.0.2 suffers from a remote SQL injection vulnerability.
View ArticleJoomla! vReview 1.9.11 SQL Injection
Joomla! vReview component version 1.9.11 suffers from a remote SQL injection vulnerability.
View ArticleJoomla! J-MultipleHotelReservation 6.0.7 SQL Injection
Joomla! J-MultipleHotelReservation component version 6.0.7 suffers from a remote SQL injection vulnerability.
View ArticleJoomla! J-ClassifiedsManager 3.0.5 SQL Injection
Joomla! J-ClassifiedsManager component version 3.0.5 suffers from a remote SQL injection vulnerability.
View ArticleNagios XI 5.5.6 Remote Code Execution / Privilege Escalation
Nagios XI version 5.5.6 suffers from remote code execution and privilege escalation vulnerabilities.
View ArticleJoomla! vBizz 1.0.7 SQL Injection
Joomla! vBizz component version 1.0.7 suffers from a remote SQL injection vulnerability.
View ArticleJoomla! vBizz 1.0.7 Code Execution
Joomla! vBizz component version 1.0.7 suffers from a code execution vulnerability.
View ArticleJoomla! VMap 1.9.6 SQL Injection
Joomla! VMap component version 1.9.6 suffers from a remote SQL injection vulnerability.
View ArticleJoomla! J-BusinessDirectory 4.9.7 SQL Injection
Joomla! J-BusinessDirectory component version 4.9.7 suffers from a remote SQL injection vulnerability.
View ArticleJoomla! Easy Shop 1.2.3 Local File Inclusion
Joomla! Easy Shop component version 1.2.3 suffers from a local file inclusion vulnerability.
View ArticleMicrosoft Windows Contact File HTML Link Injection Remote Code Execution
Microsoft Windows has a flaw where a contact file can be leveraged with a malicious mailto: link to achieve code execution.
View ArticleDNN 9.1 XML Related Cross Site Scripting
DNN version 9.1 suffers from a cross site scripting issue that can be achieved via an XML vulnerability.
View ArticleAbantecart 1.2.12 Cross Site Scripting
Abantecart version 1.2.12 suffers from a cross site scripting vulnerability.
View ArticleCoppermine 1.5.46 Cross Site Scripting
Coppermine version 1.5.46 suffers from multiple cross site scripting vulnerabilities.
View ArticleGhostscript Pseudo-Operator Remote Code Execution
Ghostscript has an issue with pseudo-operators that can lead to remote code execution. Version 9.26 is affected.
View ArticleI2P 0.9.38
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is...
View ArticleAddressSanitizer (ASan) SUID Executable Privilege Escalation
This Metasploit module attempts to gain root privileges on Linux systems using setuid executables compiled with AddressSanitizer (ASan). ASan configuration related environment variables are permitted...
View Article
More Pages to Explore .....