Description: Google has released Chrome version 61.0.3163.100 for Windows, Mac, and Linux. This update addresses multiple vulnerabilities that an attacker may exploit to cause a denial-of-service condition. Impact: Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop_21.html
Description: Joomla! has released version 3.8.0 of its Content Management System (CMS) software to address several vulnerabilities. Impact: Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: https://www.joomla.org/announcements/release-news/5713-joomla-3-8-0-release.html
Description: WordPress versions 4.8.1 and earlier are affected by several security issues and advised to upgrade to 4.8.2 immediately. Impact: Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Description: Apple has released security updates to address vulnerabilities in multiple products. The products addressed are as below : iOS 11 Safari 11 tvOS 11 watchOS 4 Xcode 9 Impact: Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: https://support.apple.com/en-us/HT208112 https://support.apple.com/en-us/HT208116 https://support.apple.com/en-us/HT201222...
Read More
Description: The Apache Foundation has released security updates to address vulnerabilities in Apache Tomcat. When running on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by...
Read More