Backdoor.Win32.Nyara.aq MVID-2021-0335 Insecure Permissions
Backdoor.Win32.Nyara.aq malware suffers from an insecure permissions vulnerability.
View ArticlePatient Appointment Scheduler System 1.0 Shell Upload
Patient Appointment Scheduler System version 1.0 suffers from a remote shell upload vulnerability.
View ArticlePatient Appointment Scheduler System 1.0 Cross Site Scripting
Patient Appointment Scheduler System version 1.0 suffers from a persistent cross site scripting vulnerability.
View ArticleBackdoor.Win32.Small.gs MVID-2021-0336 Code Execution
Backdoor.Win32.Small.gs malware suffers from a code execution vulnerability.
View ArticleRed Hat Security Advisory 2021-3431-01
Red Hat Security Advisory 2021-3431-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
View ArticleSmartFTP Client 10.0.2909.0 Denial Of Service
SmartFTP Client version 10.0.2909.0 suffers from a denial of service vulnerability.
View ArticleRed Hat Security Advisory 2021-3436-01
Red Hat Security Advisory 2021-3436-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
View ArticleWordPress WP Sitemap Page 1.6.4 Cross Site Scripting
WordPress WP Sitemap Page plugin version 1.6.4 suffers from a persistent cross site scripting vulnerability.
View ArticleBackdoor.Win32.Small.vjt MVID-2021-0337 Code Execution
Backdoor.Win32.Small.vjt malware suffers from a code execution vulnerability.
View ArticleWordPress Survey And Poll 1.5.7.3 SQL Injection
WordPress Survey and Poll plugin version 1.5.7.3 suffers from a remote SQL injection vulnerability.
View ArticleRed Hat Security Advisory 2021-3440-01
Red Hat Security Advisory 2021-3440-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed...
View ArticlePacket Fence 11.0.0
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to...
View Article