Security
Headlines
HeadlinesLatestCVEs

Source

Packet Storm

Debian Security Advisory 5412-1

Debian Linux Security Advisory 5412-1 - Several vulnerabilities were discovered in libraw, a library for reading RAW files obtained from digital photo cameras, which may result in denial of service or the execution of arbitrary code if specially crafted files are processed.

Packet Storm
#vulnerability#linux#debian#dos#git
Debian Security Advisory 5414-1

Debian Linux Security Advisory 5414-1 - Jose Gomez discovered that the Catalog API endpoint in the Docker registry implementation did not sufficiently enforce limits, which could result in denial of service.

New MVC Shop 1.0 SQL Injection / Missing Attributes

New MVC Shop version 1.0 suffers from remote SQL injection and missing attribute vulnerabilities.

Simple Customer Relationship Management CRM 2023 1.0 SQL Injection

Simple Customer Relationship Management CRM 2023 version 1.0 suffers from a remote SQL injection vulnerability.

e-Biz Technocrats Pvt.Ltd SQL Injection

It appears that sites designed by e-Biz Technocrats Pvt.Ltd suffer from a remote SQL injection vulnerability. As they do not provide any sort of versioning with their offerings, the researcher was unable to provide affected versions. Versions as of May 11, 2023 were affected.

Jobs Portal 3.6 Insecure Settings

Jobs Portal version 3.6 appears to leave default credentials installed after installation.

Camaleon CMS 2.7.0 Server-Side Template Injection

Camaleon CMS version 2.7.0 suffers from a server-side template injection vulnerability.

Debian Security Advisory 5411-1

Debian Linux Security Advisory 5411-1 - Multiple issues were found in GPAC multimedia framework, which could result in denial of service or potentially the execution of arbitrary code.

Ubuntu Security Notice USN-6109-1

Ubuntu Security Notice 6109-1 - Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service. Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information.

Seagate Central Storage 2015.0916 User Creation / Command Execution

This Metasploit module exploits the broken access control vulnerability in Seagate Central External NAS Storage device. Subject product suffers several critical vulnerabilities such as broken access control. It makes it possible to change the device state and register a new admin user which is capable of SSH access.