PHP vulnerabilities

USN-5300-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 21.10. Original advisory details: It was discovered that PHP incorrectly handled certain scripts. An ...

Continue Reading
PHP vulnerabilities

USN-5300-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. Original advisory details: It was discovered that PHP incorrectly han ...

Continue Reading
SUSE SLES15 Security Update : php7 (SUSE-SU-2022:0679-1)

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:0679-1 advisory. - An issue was discovered in PHP 7.3.x befor ...

Continue Reading
fence-agents bug fix and enhancement update

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.Read More ...

Continue Reading
RST Threat feed. IOC: brick-icy-soap.glitch.me

Found **brick-icy-soap[.]glitch.me** in [RST Threat Feed](https...Read More ...

Continue Reading
ECP SAML binding bypasses authentication flows

### Description A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentic ...

Continue Reading
Security Bulletin: A security vulnerability has been identified in WebSphere Application Server shipped with IBM InfoSphere Global Name Management (CVE-2016-8919)

## Summary WebSphere Application Server is shipped as a component of IBM InfoSphere Global Name Management. Information about a security vulnerability affecting WebSphere Application Server has been p ...

Continue Reading
CVE-2022-28213

When a user access SOAP Web services in SAP BusinessObjects Business Intelligence Platform - version 420, 430, it does not sufficiently validate the XML document accepted from an untrusted source, whi ...

Continue Reading

Back to Main

Subscribe for the latest news: