This Metasploit module exploits a vulnerability in Linux kernels 4.15.0 to 4.18.18, and 4.19.0 to 4.19.1, where broken uid/gid mappings between nested user namespaces and kernel uid/gid mappings allow elevation…
>> ARCHIVE: 2018-11
The imap_open function within PHP, if called without the /norsh flag, will attempt to preauthenticate an IMAP session. On Debian based systems, including Ubuntu, rsh is mapped to the ssh…
An impersonation issue in BMC Remedy version 7.1 may lead to incorrect user context in Remedy AR System Server.
Avahi-daemon in Avahi version through 0.7 inadvertently sends Legacy Unicast Responses to IPv4 unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial…
A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow a local attacker to elevate privileges. This vulnerability is related to a previous security…
WordPress SEO (Yoast SEO) plugin versions 9.1 and below suffer from a race condition that allows for command execution.
It was discovered that the Unitrends bpserverd proprietary protocol, as exposed via xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue…
Joomla Fabrik component version 3.9 suffers from cross site request forgery, local file inclusion, and remote shell upload vulnerabilities.
Joomla DJ Image Slider component version 3.2.3 suffers from a database disclosure vulnerability.
Joomla Event Booking component version 3.8.3 suffers from a database backup disclosure vulnerability.