Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Software Blogs  >  MondoUnix - Unix,Linux,FreeBSD,Howto,Networking,Ip software Blog  > 

2018-02-03 03:57
This Metasploit module attempts to gain root privileges on Linux systems by invoking the default coredump handler inside a namespace (“container”). Apport versions 2.13 through 2… Read More
2018-02-03 03:54
Claymore Dual GPU Miner versions 10.5 and below suffer from format string vulnerabilities. Source: Claymore Dual GPU Miner 10.5 Format String The post Claymore Dual GPU Miner 10.5 Format Str… Read More
2018-02-03 03:46
WebKit suffers from a use-after-free vulnerability in detachWrapper. Source: WebKit detachWrapper Use-After-Free The post WebKit detachWrapper Use-After-Free appeared first on MondoUnix Read More
2018-02-03 03:03
Joomla! JMS Music component version 1.1.1 suffers from a remote SQL injection vulnerability. Source: Joomla! JMS Music 1.1.1 SQL Injection The post Joomla! JMS Music 1.1.1 SQL Injection appe… Read More
2018-02-03 02:55
Event Manager PHP Script version 1.0 suffers from a remote SQL injection vulnerability. Source: Event Manager PHP Script 1.0 SQL Injection The post Event Manager PHP Script 1.0 SQL Injection… Read More
2018-02-01 00:53
This archive contains all of the 268 exploits added to Packet Storm in January, 2018. Source: Packet Storm New Exploits For January, 2018 The post Packet Storm New Exploits For January, 2018… Read More
2018-01-31 23:23
IPSwitch MoveIt versions 8.1 through 9.4 suffer from a persistent cross site scripting vulnerability. Source: IPSwitch MoveIt 9.4 Cross Site Scripting The post IPSwitch MoveIt 9.4 Cross Site… Read More
2018-01-31 16:59
systemd (systemd-tmpfiles) versions prior to 236 suffer from an fs.protected_hardlinks=0 local privilege escalation vulnerability. Source: systemd Local Privilege Escalation The post systemd… Read More
2018-01-30 17:37
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the ne… Read More
2018-01-30 17:02
Joomla! Visual Calendar component version 3.1.3 suffers from a remote SQL injection vulnerability. Source: Joomla! Visual Calendar 3.1.3 SQL Injection The post Joomla! Visual Calendar 3.1.3… Read More
2018-01-28 17:37
Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusabilit… Read More
2018-01-28 17:37
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general syst… Read More
2018-01-26 03:28
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, fro… Read More
2018-01-26 03:26
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable m… Read More
2018-01-26 03:17
AsusWRT Router versions prior to 3.0.0.4.380.7743 suffer from an unauthenticated LAN remote code execution vulnerability. Source: AsusWRT Router Remote Code Execution The post AsusWRT Router… Read More
2018-01-24 17:03
RAVPower version 2.000.056 suffers from a memory disclosure vulnerability. Source: RAVPower 2.000.056 Memory Disclosure The post RAVPower 2.000.056 Memory Disclosure appeared first on MondoU… Read More
2018-01-24 17:01
MixPad version 5.00 suffers from a buffer overflow vulnerability. Source: MixPad 5.00 Buffer Overflow The post MixPad 5.00 Buffer Overflow appeared first on MondoUnix Read More
2018-01-24 16:54
Oracle VirtualBox versions prior to 5.1.30 and 5.2-rc1 suffer from a guest to host escape vulnerability. Source: Oracle VirtualBox Guest To Host Escape The post Oracle VirtualBox Guest To Ho… Read More
2018-01-23 00:02
Blizzard’s agent rpc authentication mechanism is vulnerable to DNS rebinding attacks. Source: Blizzard Agent RPC Auth DNS Rebinding The post Blizzard Agent RPC Auth DNS Rebinding appea… Read More
2018-01-20 17:09
Shopware versions 5.2.5 and 5.3 suffer from multiple cross site scripting vulnerabilities. Source: Shopware 5.2.5 / 5.3 Cross Site Scripting The post Shopware 5.2.5 / 5.3 Cross Site Scriptin… Read More
2018-01-20 16:58
Agora Project version 3.3.5 suffers from a cross site scripting vulnerability via file uploads. Source: Agora Project 3.3.5 Cross Site Scripting The post Agora Project 3.3.5 Cross Site Scrip… Read More

Share the post

MondoUnix - Unix,Linux,FreeBSD,Howto,Networking,Ip

×

Subscribe to Mondounix - Unix,linux,freebsd,howto,networking,ip

Get updates delivered right to your inbox!

Thank you for your subscription

×