📢 Ubuntu Core 22 is now generally available for IoT and edge devices 📢
📖 Read
via "ITPro".
The new release brings security updates and support for a fully preemptible kernel📖 Read
via "ITPro".
IT PRO
Ubuntu Core 22 is now generally available for IoT and edge devices | IT PRO
The new release brings security updates and support for a fully preemptible kernel
📢 Cloudflare mitigates biggest ever HTTPS DDoS attack 📢
📖 Read
via "ITPro".
A botnet generated over 212 million HTTPS requests from over 1,500 networks in 121 countries📖 Read
via "ITPro".
IT PRO
Cloudflare mitigates biggest ever HTTPS DDoS attack | IT PRO
A botnet generated over 212 million HTTPS requests from over 1,500 networks in 121 countries
📢 Microsoft Defender for Individuals to offer protections on macOS, iOS, and Android 📢
📖 Read
via "ITPro".
Family-friendly offering will come with a centralised dashboard to help manage security across different platforms📖 Read
via "ITPro".
ITPro
Microsoft Defender for Individuals to offer protections on macOS, iOS, and Android
Family-friendly offering will come with a centralised dashboard to help manage security across different platforms
‼ CVE-2014-125025 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as problematic has been found in FFmpeg 2.0. This affects the function decode_pulses. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125023 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in FFmpeg 2.0. It has been declared as problematic. Affected by this vulnerability is the function truemotion1_decode_header of the component Truemotion1 Handler. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125020 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been found in FFmpeg 2.0 and classified as critical. This vulnerability affects the function decode_update_thread_context. The manipulation leads to memory corruption. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125022 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in FFmpeg 2.0. It has been classified as problematic. Affected is the function shorten_decode_frame of the component Bitstream Buffer. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125019 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in FFmpeg 2.0. This affects the function decode_nal_unit of the component Slice Segment Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125018 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, has been found in FFmpeg 2.0. Affected by this issue is the function decode_slice_header. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125021 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in FFmpeg 2.0 and classified as problematic. This issue affects the function cmv_process_header. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-125024 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in FFmpeg 2.0. It has been rated as critical. Affected by this issue is the function lag_decode_frame. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2125 ‼
📖 Read
via "National Vulnerability Database".
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2126 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.📖 Read
via "National Vulnerability Database".
👍3
‼ CVE-2022-2129 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-34005 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-34000 ‼
📖 Read
via "National Vulnerability Database".
libjxl 0.6.1 has an assertion failure in LowMemoryRenderPipeline::Init() in render_pipeline/low_memory_render_pipeline.cc.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-34006 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTIN\Users as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITY\SYSTEM, aka NX-I674 (sub-issue 2).📖 Read
via "National Vulnerability Database".
‼ CVE-2017-20060 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in Elefant CMS 1.3.12-RC. This affects an unknown part of the component Blog Post Handler. The manipulation leads to basic cross site scripting (Persistent). It is possible to initiate the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.📖 Read
via "National Vulnerability Database".
‼ CVE-2017-20064 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Elefant CMS 1.3.12-RC. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /designer/add/layout. The manipulation leads to code injection. The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.📖 Read
via "National Vulnerability Database".
‼ CVE-2017-20062 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Elefant CMS 1.3.12-RC and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.📖 Read
via "National Vulnerability Database".
‼ CVE-2017-20058 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.📖 Read
via "National Vulnerability Database".