Security Advisories & Alerts


Huawei Storage Products CVE-2016-8801 Remote Privilege Escalation Vulnerability

Description: Huawei OceanStor 5600 V3 with V300R003C00C10 and earlier versions allows attackers with administrator privilege to inject a command into a specific command’s parameters, and run this injected command with root privilege. Impact: An attacker can exploit this issue to gain elevated privileges and perform unauthorized actions. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: http://www.cvedetails.com/cve/CVE-2016-8801/ http://www.securityfocus.com/bid/94832/info http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161207-01-storage-en


Oracle API Gateway CVE-2017-3601 Remote Security Vulnerability

Description: Vulnerability in the Oracle API Gateway component of Oracle Fusion Middleware (subcomponent: Oracle API Gateway). The supported version that is affected is 11.1.2.4.0. Easily “exploitable” vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle API Gateway. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification...

Read More


Oracle Solaris CVE-2017-3623 Remote Code Execution Vulnerability

Description: Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel RPC). For supported versions that are affected see note. Easily “exploitable” vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3623 is assigned...

Read More


Apache Solr CVE-2017-7660 Security Bypass Vulnerability

Description: Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe that the malicious node is a member of the cluster. So, if Solr users...

Read More


RoundCube Webmail CVE-2017-8114 Multiple Privilege Escalation Vulnerabilities

Description: RoundCube Webmail is prone to multiple privilege escalation vulnerabilities. RoundCube Webmail versions prior to 1.0.11, 1.1.x prior to 1.1.9, and 1.2.x prior to 1.2.5 are vulnerable. Impact: An attackers may exploit these issues to gain elevated privileges. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: http://www.securityfocus.com/bid/98445/info https://roundcube.net/news/2017/04/28/security-updates-1.2.5-1.1.9-and-1.0.11


WordPress WP Statistics Plugin CVE-2017-2147 Unspecified Cross Site Scripting Vulnerability

Description: The WP Statistics plugin for WordPress is prone to an unspecified cross-site-scripting vulnerability because it fails to sufficiently sanitize user-supplied input. Impact: An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Versions prior...

Read More


SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software

Description: The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an...

Read More


CVE-2017-3143: An error in TSIG authentication can permit unauthorized dynamic updates

Description: An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Impact:  A server that relies solely on TSIG keys with no other address-based ACL protection could be vulnerable to malicious...

Read More


CVE-2017-3142: An error in TSIG authentication can permit unauthorized zone transfers

Description: An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet.  A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of...

Read More


Microsoft CVE-2017-0261: Microsoft Office Remote Code Execution Vulnerability

Description: Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka “Office Remote Code Execution Vulnerability”. This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281. Impact: An attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely...

Read More


Page 59 of 65« First...102030...5758596061...Last »