Security Advisories & Alerts

WordPress versions 4.7.1 and earlier are vulnerable by three security issues

Description: The user interface for assigning taxonomy terms in Press is shown to users who do not have permissions to use it. WP_Query is vulnerable to a SQL injection (SQLi) when passing unsafe data. WordPress core is not directly vulnerable to this issue. A cross-site scripting (XSS) vulnerability was discovered in the posts list table. An unauthenticated privilege escalation vulnerability was discovered in a REST...

Read More


SQL Injection Vulnerability in NextGEN Gallery for WordPress

Description: WordPress plugin NextGEN Gallery has severe SQL Injection vulnerability. According to the original source, one of the following conditions must be met for exploitation: The use of a NextGEN Basic TagCloud gallery. If users are able to submit posts to be reviewed (contributors). Impact: This vulnerability allows an unauthenticated user to grab data from the victim’s website database including sensitive user information. Mitigation: Vendor...

Read More


CVE-2016-0099: Microsoft Windows 7 < 10 / Server 2008 < 2012 R2 (x86/x64) - Privilege Escalation (MS16-032)

CVE-2016-0099: The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka “Secondary Logon Elevation of Privilege Vulnerability.” Mitigation: Microsoft has released patches...

Read More


CVE-2016-5195: Linux Kernel 2.6.22 < 3.9 (x86/x64) - 'Dirty COW' Privilege Escalation Linux exploit

CVE-2016-5195: Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka “Dirty COW.” Mitigation: Updates are available. Please check vendor advisory for more information. Reference URL’s: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195 https://dirtycow.ninja/ https://access.redhat.com/security/cve/cve-2016-5195 https://access.redhat.com/security/vulnerabilities/DirtyCow https://security-tracker.debian.org/tracker/CVE-2016-5195


MS15-051: Vulnerabilities in Windows kernel-mode drivers could allow Elevation of Privilege

The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on locally and runs arbitrary code in kernel mode. An attacker could then install programs, view, change or delete data or create new accounts with full user rights. Mitigation: Microsoft has released patches for Windows Platform. Reference URL’s: http://www.cvedetails.com/cve/cve-2015-1676 http://www.cvedetails.com/cve/cve-2015-1677 http://www.cvedetails.com/cve/cve-2015-1678 http://www.cvedetails.com/cve/cve-2015-1679 http://www.cvedetails.com/cve/cve-2015-1680 http://www.cvedetails.com/cve/cve-2015-1701 https://technet.microsoft.com/library/security/MS15-051 https://support.microsoft.com/en-us/help/3057191/ms15-051-vulnerabilities-in-windows-kernel-mode-drivers-could-allow-information-disclosure-may-12,-2015


Page 131 of 132« First...102030...128129130131132