[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

Bas van Schaik and Kevin Backhouse discovered a stack-based buffer overflow vulnerability in librelp, a library providing reliable event logging over the network, triggered while checking x509 certificates from a peer. A remote attacker able to connect to rsyslog can take advantage of this flaw for remote code execution by sending a specially crafted x509 certificate

Several vulnerabilities were discovered in tinc, a Virtual Private Network daemon. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-16738 Michael Yonli discovered a flaw in the implementation of the authentication protocol that could allow a remote attacker to establish an authenticated, one-way connection with another node. CVE-2018-16758 Michael Yonli ...

The host is installed with Oracle MySQL Server through 5.7.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: InnoDB. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.5.50, 5.6.31 or 5.7.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DML. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.7.14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Packaging. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.

The host is installed with Oracle MySQL Server through 5.7.14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.7.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Performance Schema. Successful exploitation allows attackers to affect Availability.

Simon McVittie discovered a cross-site scripting vulnerability in the error reporting of Ikiwiki, a wiki compiler. This update also hardens ikiwiki"s use of imagemagick in the img plugin.

Several vulnerabilities were discovered in wordpress, a web blogging tool, which could allow remote attackers to compromise a site via cross-site scripting, bypass restrictions, obtain sensitive revision-history information, or mount a denial of service.

Multiple vulnerabilities have been found in the Ikiwiki wiki compiler: CVE-2016-9646 Commit metadata forgery via CGI::FormBuilder context-dependent APIs CVE-2016-10026 Editing restriction bypass for git revert CVE-2017-0356 Authentication bypass via repeated parameters Additional details on these vulnerabilities can be found at https://ikiwiki.info/security/


Pages:      Start    7407    7408    7409    7410    7411    7412    7413    7414    7415    7416    7417    7418    7419    7420    ..   19779

© SecPod Technologies