DNS auto-registration and auto-discovery can be used as proxy for gathering network packets, violating confidentiality. IMPACT: NORMAL PUBLISH DATE: 06-09-2018 OVERVIEW If […]
A vulnerability in Linux Kernel, that can be exploited by people with malicious intent to cause a Denial of Service, has been patched. IMPACT: MEDIUM […]
A vulnerability in Microsoft Windows Task Scheduler can be exploited to gain escalated privileges. IMPACT: MEDIUM PUBLISH DATE: 28-08-2018 OVERVIEW Elevated SYSTEM privileges can be gained […]
Red Hat has issued an update for postgresql. This fixes a vulnerability in which certain host connection parameters defeat client-side security defenses IMPACT: CRITICAL PUBLISH […]
A remote code execution vulnerability exists in various versions of Apache Struts which may take over the control of a system in case a successful attack. IMPACT: […]
A remote code execution vulnerability exists in Microsoft Windows that can provide user privileges to an attacker IMPACT: HIGH PUBLISH DATE: 16-08-2018 OVERVIEW Microsoft Windows […]
Multiple vulnerabilities are found in VMware Workstation Player which may result in disclosure of sensitive information and bypassing of certain security restrictions. IMPACT: CRITICAL PUBLISH […]
A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data. This may lead to unauthorized modification of system or user information. […]
Multiple vulnerabilities in Microsoft Windows Adobe Flash Player may cause information disclosure, privilege escalation or security mitigation bypass. IMPACT: NORMAL PUBLISH DATE: 14-08-2018 OVERVIEW […]