WordPress WP Support Plus Responsive Ticket System plugin version 7.1.3 suffers from a privilege escalation vulnerability.
e1a6d29a3a7d1a6dc4415808a242a113b2856f60bb4ffc8561fc238e458bd0fb
Red Hat Security Advisory 2017-0036-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
15164c175d193bcb243a86da700b13f6c2a1a766792df90f796ac8026c818f27
Red Hat Security Advisory 2017-0031-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
9ad7eb5dde2c4eeb2c88e594e6f9fd2abb9e2c9b13c9dc4ea3b4ad1d8ee887dc
Ubuntu Security Notice 3166-1 - A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
47e8847f015295b9ba065691090ec34d27c22e13558feda7267ca44eef4d0fdd
This bulletin summary lists four released Microsoft security bulletins for January, 2017.
78345956757edaa6172654a0f3de000dc4c28e2b3ac06175c4b05f51439fc8e6
FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.
a35d3eaf5df92fd2374091c158b50932f76ef5a47dab63613ebe767ded330c60
Responsive Poll versions 1.6.4 and 1.7.4 suffer from cross site request forgery and cross site scripting vulnerabilities.
ee6234965da9f0f4d9be5eecc91280e2f8c402d7627fe1d94a5d6448edc5a9ea
Docker Engine versions prior to 1.12.6 suffer from an insecure open of a file descriptor.
c6dd4934c055006df86b6145b7e548b07287014ac26ce1af46e0b6fa783d1157
Gentoo Linux Security Advisory 201701-18 - Multiple vulnerabilities have been found in Python, the worst of which could lead to arbitrary code execution. Versions less than 3.4.5 are affected.
46e9be8b3d003d907e7a28e2e17187130a2c93f2a9c8aff524c66049757de5c8
BSides Las Vegas 2017 has announced its Call For Papers. It will take place July 25th and 26th, 2017, in Las Vegas, Nevada.
0bd7b2f4990f55d2293bab6a5b9fd11822e7553f3052943da64144773ad35e1b
Gentoo Linux Security Advisory 201701-17 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 24.0.0.186 are affected.
e6c72c46d38c2ad1489a593aaff82b3b8f907eea070dcd0363f677cd3eae3714
FMyLife Clone Script Pro Edition version 1.1 suffers from a cross site request forgery vulnerability.
ad0e9c092a3871d8ec62a0d3fb19eb9581acf2407105fac5294ebe33a52cdfd1
An independent research uncovered a critical vulnerability in badly configured webadmin plugin of many thousand enigma2 boxes in the wild. This misconfiguration could be used by unauthenticated remote attackers to achieve remote arbitrary code execution in the context of root superuser. To exploit the vulnerability an attacker could target common ISP networks for dial-in users.
dbc3dbad2dc6e079840c687794b1d6eb95d782672f94cfae413cfa9975e07365
Starting Page version 1.3 suffers from a remote SQL injection vulnerability.
bbb9210dfb9d4299ddda7ce3bef2c48df4aad9ed78d0a95c416f8c4f49a7bac1
Make or Break version 1.7 suffers from a remote SQL injection vulnerability.
5521ce024e9e90227233de7ad43a6b6240c66bb22dae10c09285feb34fd12aea
DiskBoss Enterprise version 7.5.12 POST SEH buffer overflow exploit.
610d06a56c61c95b23c057ce0dba043a8182d4bb01f3d469d4c0718e4278c985