In snapd 2.27 through 2.29.2 the ‘snap logs’ command could be made to call journalctl without match arguments and therefore allow unprivileged, unauthenticated users to bypass systemd-journald’s access restrictions. Date published : 2018-02-02 https://github.com/snapcore/snapd/pull/4194...
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource...
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack)....
SQL Injection exists in the JMS Music 1.1.1 component for Joomla! via a search with the keyword, artist, or username parameter. Date published : 2018-02-02 https://www.exploit-db.com/exploits/43959
Arbitrary file upload exists in the Jimtawl 2.1.6 and 2.2.5 component for Joomla! via a view=upload&task=upload&pop=true&tmpl=component request. Date published : 2018-02-02 https://www.exploit-db.com/exploits/43958
SQL Injection exists in the JEXTN Reverse Auction 3.1.0 component for Joomla! via a view=products&uid= request. Date published : 2018-02-02 https://www.exploit-db.com/exploits/43950
SQL Injection exists in the JE PayperVideo 3.0.0 component for Joomla! via the usr_plan parameter in a view=myplans&task=myplans.usersubscriptions request. Date published : 2018-02-02 https://www.exploit-db.com/exploits/43948
SQL Injection exists in the JEXTN Membership 3.1.0 component for Joomla! via the usr_plan parameter in a view=myplans&task=myplans.usersubscriptions request. Date published : 2018-02-02 https://www.exploit-db.com/exploits/43940
SQL Injection exists in Event Manager 1.0 via the event.php id parameter or the page.php slug parameter. Date published : 2018-02-02 https://www.exploit-db.com/exploits/43949
SQL Injection exists in the JEXTN Classified 1.0.0 component for Joomla! via a view=boutique&sid= request. Date published : 2018-02-02 https://www.exploit-db.com/exploits/43957
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is...
The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments...
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.