Vtiger version 6.3.0 CRM's administration interface allows for the upload of a company logo. Instead of uploading an image, an attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file. This Metasploit module was tested against vTiger CRM version 6.3.0.
72429cacd6f8d8507d950f72f13a44cd
Ubuntu Security Notice 3725-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.61 in Ubuntu 14.04 LTS. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.23. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
62a993774568d1bf05266b42f9da9fb9
Red Hat Security Advisory 2018-2289-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Security fix: An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit. As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. Issues addressed include a bypass vulnerability.
4f5de6a9085a9c88e44314350bb7defb
Red Hat Security Advisory 2018-2290-01 - memcached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load. Issues addressed include an integer overflow.
c26aa9cb1f312c0d63fed70db09bddae
Microsoft Wireless Display Adapter versions 2.0.8350 to 2.0.8372 suffer from command injection, broken access control, and evil twin attack vulnerabilities.
79b0670ec3acfc2b6e1824b11bd94e05
Dell EMC NetWorker versions between 9.0 and 9.1.1.8 through 9.2.1.3, and the version 18.1.0.1 contain a clear-text authentication over network vulnerability in the Rabbit MQ Advanced Message Queuing Protocol (AMQP) component. User credentials are sent unencrypted to the remote AMQP service. An unauthenticated attacker in the same network collision domain, could potentially sniff the password from the network and use it to access the component using the privileges of the compromised user.
8fa258c990062b421d7f2ccfc60ca833
Red Hat Security Advisory 2018-2282-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 68.0.3440.75. Issues addressed include buffer overflow, bypass, and information leakage vulnerabilities.
ebe959506bce23a345eeeda9a2fcda81
Red Hat Security Advisory 2018-2284-01 - The yum-utils packages provide a collection of utilities and examples for the yum package manager to make yum easier and more powerful to use. Issues addressed include a traversal vulnerability.
45d2e395a8b0aad4dc5c6ff4652a8649
Red Hat Security Advisory 2018-2285-01 - The yum-utils packages provide a collection of utilities and examples for the yum package manager to make yum easier and more powerful to use. Issues addressed include a traversal vulnerability.
823f762b02ba8390aad6ffc0bae1fbfe
Red Hat Security Advisory 2018-2286-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Issues addressed include an insufficient validation vulnerability.
b3ba56a1db611042993da9b1a9743b0f
Red Hat Security Advisory 2018-2283-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Issues addressed include an insufficient validation vulnerability.
907fa2857e3f019f7d5482b03814645e
Debian Linux Security Advisory 4257-1 - Jann Horn discovered that FUSE, a Filesystem in USErspace, allows the bypass of the 'user_allow_other' restriction when SELinux is active (including in permissive mode). A local user can take advantage of this flaw in the fusermount utility to bypass the system configuration and mount a FUSE filesystem with the 'allow_other' mount option.
f932429bd8527a9205a47d92419b417a
Debian Linux Security Advisory 4258-1 - Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.
b29735aa0ee881fa568c841333c8a3cd
Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues.
d7ee2928b29a9f1ff336b8c72a357a59
Gentoo Linux Security Advisory 201807-4 - A heap-based buffer overflow in cURL might allow remote attackers to execute arbitrary code. Versions less than 7.61.0 are affected.
d1eab4e145e6e1b33fc6fddb5dce05d5
Gentoo Linux Security Advisory 201807-3 - Multiple vulnerabilities have been found in ZNC, the worst of which could result in privilege escalation. Versions less than 1.7.1-rc1 are affected.
875bd82bb9479cd1df1a399538cc11bb
Charles Proxy version 4.2 suffers from a local root privilege escalation vulnerability.
96d52f648a1dd6a9a475dd5d37ec6868
It is possible to bypass fusermount's restrictions on the use of the "allow_other" mount option as follows if SELinux is active.
9e10d920caa48857046e580c577e1ff4
H2 Database version 1.4.197 suffers from an information disclosure vulnerability.
8c87f441c10407247f7e65eceec1ee6d
Microsoft Windows Kernel win32k!NtUserConsoleControl denial of service proof of concept exploit.
baeebc065565ab91d6585025b4f98177
Allok MOV Converter version 4.6.1217 suffers from a buffer overflow vulnerability.
d486d9122e1550d3d7d275716808a547
ipPulse version 1.92 suffers from a denial of service vulnerability.
8561c270f0c8f4d97c126caf721be7c8
Responsive Filemanager version 9.13.1 suffers from a server-side request forgery vulnerability.
9ea189ebe988e84ea737aadd00966199
ProjectSend version R1053 suffers from a remote SQL injection vulnerability.
e188d76af8d5bdbce988c0b31f144e58
Super CMS Blog Pro PHP Script version 1.0 suffers from a cross site scripting vulnerability.
65c8fcb0181b7cc5639b9ffd8ad8014c