WordPress NAB Transact WooCommerce plugin version 2.1.0 suffers from a payment bypass vulnerability.
38cc536fa634ad0e7e4c8028f098b79ee4e5dc38a1859d06b32822642b372df3
Joomla Adagency component version 6.1.2 suffers from a cross site scripting vulnerability.
abb8431114fe989f411ee64dae2f7a471688ffc43c4c3da83f30f573d71b8dc2
ElkarBackup version 1.3.3 suffers from a persistent cross site scripting vulnerability.
155269b3cd80f03f0df79bd44adf7aab9af4e49dffb380a4a25e846c3ed37aee
PNPSCADA version 2.200816204020 suffers from a remote SQL injection vulnerability.
21d4b822f7e6ab7cf0179041bbe32655dba1ed01df891cec21eaff36042ddb51
Ubuntu Security Notice 4466-2 - USN-4466-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 14.04 ESM. Marc Aldorasi discovered that curl incorrectly handled the libcurl CURLOPT_CONNECT_ONLY option. This could result in data being sent to the wrong destination, possibly exposing sensitive information. Various other issues were also addressed.
363e84a6881deb664f7e20ddce597515fb13c1c11a5725e143a645f4a705bca0
Red Hat Security Advisory 2020-3525-01 - Quay 3.3.1 release has been released. An issue where build triggers can disclose robot account names and existence of private repos within namespaces has been addressed.
3f0048d4bdec59a51f24f090fac9217f3567fd502a0907966e5df07b310946ee
Ubuntu Security Notice 4467-1 - Ziming Zhang and VictorV discovered that the QEMU SLiRP networking implementation incorrectly handled replying to certain ICMP echo requests. An attacker inside a guest could possibly use this issue to leak host memory to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS. Eric Blake and Xueqiang Wei discovered that the QEMU NDB implementation incorrectly handled certain requests. A remote attacker could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. Various other issues were also addressed.
9aa3179b34eb601658a9a487805ca5302a3e7b10616c6b4f88ebda6983d3906c
Ruijie Networks Switch eWeb S29_RGOS version 11.4 suffers from a directory traversal vulnerability.
e67947355f710fdb12f0355326f2702534b5e368a8526c7be8b980c28738f6bb
This document is intended to provide detailed instructions for bypassing certificate pinning via a custom Root CA. It covers all the required topics for understanding this method.
e451c3653c39f8c69197cc44125ea0be0963f12054cce2cca25c7696dab74b07