The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.
cd42553b9229b45da6f62dde46c6a14c
HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a privileged command injection vulnerability.
86a3b2ec920c1057a19c890e8605ecf5
Apple Security Advisory 2020-03-24-7 - Xcode 11.4 is now available and contains security improvements.
f609da59e49dbde2949073c6650be21f
HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a Citrix receiver connection wrapper command injection vulnerability.
301879be06768cb2bb289a3ce523bf8d
Apple Security Advisory 2020-03-24-6 - iTunes for Windows 12.10.5 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.
a72a85a4fc05e31ccefefbf450488215
LeptonCMS version 4.5.0 suffers from a persistent cross site scripting vulnerability.
63e48f62f520be8f9282125543a59a16
Apple Security Advisory 2020-03-24-5 - Safari 13.1 is now available and addresses code execution and cross site scripting vulnerabilities.
335e0398d15b81413cb72fa221d6125c
An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected.
4dce3e657af82da617c0a07d72711d9d
Red Hat Security Advisory 2020-0866-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An issue was resolved where /etc/passwd was given incorrect privileges.
20dbf9e4a164ec7bf1033d54c25839d8
10-Strike Network Inventory Explorer version 8.54 suffers from a buffer overflow vulnerability.
1297e734ad970b16bb47d821fc5c845b
Apple Security Advisory 2020-03-24-4 - watchOS 6.2 is now available and addresses buffer overflow and code execution vulnerabilities.
50069fdd73233c95cd2c8d2e6f8d80bc
HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local privilege escalation vulnerability.
1441843053c9dab5b6af31aa31e3e16d
HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from an application filter bypass vulnerability.
68cf55b494dfadf53d25535a6c23313a
10-Strike Network Inventory Explorer version 8.54 suffers from a srvInventoryWebServer unquoted service path vulnerability.
33e492edb7e3947d996da9a4475106b2
Apple Security Advisory 2020-03-24-3 - tvOS 13.4 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.
334fb68c6a35aae9be91913bfa4d3111
HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local physical access information disclosure vulnerability.
255ed9d1368d7aa40e9fa99b81e489f7
Apple Security Advisory 2020-03-24-2 - macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra are now available and address buffer overflow, bypass, code execution, and information leakage vulnerabilities.
82c38838e461637024b84907dc681258
Red Hat Security Advisory 2020-0863-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.
e1a526a55e84e071b65c622b95d3c7d3
Apple Security Advisory 2020-03-24-1 - iOS 13.4 and iPadOS 13.4 are now available and address buffer overflow, code execution, and cross site scripting vulnerabilities.
7d7300842d84d76718c347323f8ea024
Android suffers from a bluetooth remote denial of service vulnerability.
230fb8c28ca8d3e3a01983332d7fa194
AVAST SecureLine version 5.5.522.0 suffers from a SecureLine unquoted service path vulnerability.
58d1a59b571f29ab242b6a4225b38cd5
Joomla GMapFP component version 3.30 suffers from an arbitrary file upload vulnerability.
ff385678ff3635685901b5f601407cc8
Whitepaper called Solving Computer Forensic Case Using Autopsy.
56e506debf00c6b80cba64557df72297