ZDI-22-953: Centreon Poller Resource SQL Injection Privilege Escalation Vulnerability
This vulnerability allows remote attackers to escalate privileges on affected installations of Centreon. Authentication is required to exploit this vulnerability. Read More
Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for arbitrary code execution. Android is an operating system...
CVE-2014-8164
A insecure configuration for certificate verification (http.verify_mode = OpenSSL::SSL::VERIFY_NONE) may lead to verification bypass in Red Hat CloudForms 5.x. Read More
CVE-2015-3172
EidoGo is susceptible to Cross-Site Scripting (XSS) attacks via maliciously crafted SGF input. Read More
CVE-2015-3173
custom-content-type-manager Wordpress plugin can be used by an administrator to achieve arbitrary PHP remote code execution. Read More
gnupg2-2.3.4-2.fc35
FEDORA-2022-1124e5882d Packages in this update: gnupg2-2.3.4-2.fc35 Update description: Fix for CVE-2022-34903 (#2103242) Read More
USN-5488-2: OpenSSL vulnerability
USN-5488-1 fixed vulnerabilities in OpenSSL. This update provides the corresponding updates for Ubuntu 16.04 ESM. Original advisory details: Chancen and Daniel Fiala discovered that OpenSSL...
CVE-2021-3695
A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause...
CVE-2021-31677
An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that can modify admin and other members' passwords. Read More
CVE-2021-31678
An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that can delete import information about a user's company. Read More