WordPress WP Support Plus Responsive Ticket System plugin version 7.1.3 suffers from a privilege escalation vulnerability.
dced8fe75b1b1c06cad1684e4aae9a49
Red Hat Security Advisory 2017-0036-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
e5c0f5e13657b313bf993b1f676e7bc7
Red Hat Security Advisory 2017-0031-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
cce2ceafe964de87861e4e4f78e4abcd
Ubuntu Security Notice 3166-1 - A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
9bf4975471e04a5e72cc93a88383ed32
This bulletin summary lists four released Microsoft security bulletins for January, 2017.
90ba5673c5ec387f9fc1fdb4332c0a48
FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.
353093b52df5bc1c5432816293400373
Responsive Poll versions 1.6.4 and 1.7.4 suffer from cross site request forgery and cross site scripting vulnerabilities.
dec53c0b81b31c66c4246741b5407797
Docker Engine versions prior to 1.12.6 suffer from an insecure open of a file descriptor.
3f3d9e31460937c29eb55a4fb404ae03
Gentoo Linux Security Advisory 201701-18 - Multiple vulnerabilities have been found in Python, the worst of which could lead to arbitrary code execution. Versions less than 3.4.5 are affected.
315156d6f023be8c82f94026fb132b6f
BSides Las Vegas 2017 has announced its Call For Papers. It will take place July 25th and 26th, 2017, in Las Vegas, Nevada.
e0d37162ebf34dc8a21d061e8ba5e7da
Gentoo Linux Security Advisory 201701-17 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 24.0.0.186 are affected.
cce3ca2979f5cd11a7730dc67fa7a3b9
FMyLife Clone Script Pro Edition version 1.1 suffers from a cross site request forgery vulnerability.
e899ce49dfea6f866892ee9fd2334fdf
An independent research uncovered a critical vulnerability in badly configured webadmin plugin of many thousand enigma2 boxes in the wild. This misconfiguration could be used by unauthenticated remote attackers to achieve remote arbitrary code execution in the context of root superuser. To exploit the vulnerability an attacker could target common ISP networks for dial-in users.
c8ed0ab1d119a6879dc47261063dec90
Starting Page version 1.3 suffers from a remote SQL injection vulnerability.
f7692636873dd9023144afe3d2e22a60
Make or Break version 1.7 suffers from a remote SQL injection vulnerability.
f35313fc5ee88a96af693938dc65ad8b
DiskBoss Enterprise version 7.5.12 POST SEH buffer overflow exploit.
fee667b53d38bc0cd123981225b58c9d