SUSE SLES15 / openSUSE 15 Security Update : php7 (SUSE-SU-2023:0514-1)

The remote SUSE Linux SLES15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:0514-1 advisory. - Password_verify() always ret ...

Continue Reading

CVSS3 - CRITICAL

SUSE SLES12 Security Update : php74 (SUSE-SU-2023:0515-1)

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:0515-1 advisory. - Password_verify() always return true with ...

Continue Reading

CVSS3 - CRITICAL

[SECURITY] [DSA 5363-1] php7.4 security update

- ------------------------------------------------------------------------- Debian Security Advisory DSA-5363-1 security@debian.org https://www.debian.org/security/ ...

Continue Reading

CVSS3 - CRITICAL

CVE-2022-44641

In Linaro Automated Validation Architecture (LAVA) before 2022.11, users with valid credentials can submit crafted XMLRPC requests that cause a recursive XML entity expansion, leading to excessive use ...

Continue Reading

CVSS3 - MEDIUM

(RHSA-2023:0742) Low: RHUI 4.3.0 release – Security Fixes, Bug Fixes, and Enhancements Update

Red Hat Update Infrastructure (RHUI) offers a highly scalable, highly redundant framework that enables you to manage repositories and content. It also enables cloud providers to deliver content and up ...

Continue Reading

CVSS3 - HIGH

CVSS2 - HIGH

LAVA Denial of Service Vulnerability

LAVA is a continuous integration system open sourced by LAVA. It is used to deploy operating systems to physical and virtual hardware to run tests.A denial of service vulnerability exists in versions ...

Continue Reading

CVSS3 - MEDIUM

RHEL 6 / 7 : rh-java-common-xmlrpc (RHSA-2020:0310)

The remote Redhat Enterprise Linux 6 / 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0310 advisory. - xmlrpc: Deserialization of server-side excep ...

Continue Reading

CVSS3 - CRITICAL

CVSS2 - HIGH

PHP vulnerability

It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code.Read More ...

Continue Reading

Back to Main

Subscribe for the latest news:
Generated by Feedzy