DSA-5749-1 flatpak – security update
Chris Williams discovered a flaw in the handling of mounts for persistent directories in Flatpak, an application deployment framework for desktop apps. A malicious or...
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe is a software that is...
Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Ivanti products, the most severe of which could allow for remote code execution. Ivanti Avalanche is a mobile device...
Critical Patches Issued for Microsoft Products, August 13, 2024
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged...
USN-6959-1: .NET vulnerability
It was discovered that .NET suffered from an information disclosure vulnerability. An attacker could potentially use this issue to read targeted email messages. Read More
Re: Microsoft PlayReady WMRMECC256 Key / root key issue (attack #5)
Posted by Security Explorations on Aug 13 Hello All, In my previous post, I shamefully confused two root keys (WMRMECC256 and ECC256MSBCertRootIssuer) while decribing the...
USN-6949-2: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...
USN-6958-1: Libcroco vulnerabilities
It was discovered that Libcroco was incorrectly accessing data structures when reading bytes from memory, which could cause a heap buffer overflow. An attacker could...
USN-6950-3: Linux kernel (Oracle) vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...
Microsoft PlayReady WMRMECC256 Key / root key issue (attack #5)
Posted by Security Explorations on Aug 13 Hello All, There is an architectural / design issue of PlayReady, which can be successfully exploited to gain...