[R1] Nessus Version 8.15.5 Fixes Multiple Third-Party Vulnerabilities
[R1] Nessus Version 8.15.5 Fixes Multiple Third-Party Vulnerabilities Arnie Cabral Thu, 05/26/2022 - 12:45 Nessus leverages third-party software to help provide underlying functionality. One of...
USN-5449-1: libXv vulnerability
It was discovered that libXv incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service, or possibly execute...
CVE-2021-34360
A cross-site request forgery (CSRF) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject...
CVE-2021-4231
A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to...
USN-5402-2: OpenSSL vulnerabilities
USN-5402-1 fixed several vulnerabilities in OpenSSL. This update provides the corresponding update for Ubuntu 16.04 ESM. Original advisory details: Elison Niven discovered that OpenSSL incorrectly...
[R1] Nessus Version 10.2.0 Fixes Multiple Third-Party Vulnerabilities
[R1] Nessus Version 10.2.0 Fixes Multiple Third-Party Vulnerabilities Arnie Cabral Thu, 05/26/2022 - 09:30 Nessus leverages third-party software to help provide underlying functionality. Several of...
CVE-2021-40317
Piwigo 11.5.0 is affected by a SQL injection vulnerability via admin.php and the id parameter. Read More
USN-5447-1: logrotate vulnerability
It was discovered that logrotate incorrectly handled the state file. A local attacker could possibly use this issue to keep a lock on the state...
USN-5446-1: dpkg vulnerability
Max Justicz discovered that dpkg incorrectly handled unpacking certain source packages. If a user or an automated system were tricked into unpacking a specially crafted...
ZDI-22-797: Trend Micro Apex One Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One. An attacker must first obtain the ability to execute...