by admin | Jan 10, 2018 | vulnerability |
An industry-wide, hardware-based CPU security vulnerability was disclosed, called Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715). For vulnerability details, you may refer to https://access.redhat.com/security/vulnerabilities/speculativeexecution...
by admin | Jul 21, 2016 | vulnerability |
A vulnerability report was released in Apache. For details, you may refer to https://www.apache.org/security/asf-httpoxy-response.txt https://access.redhat.com/security/vulnerabilities/httpoxy It involves the web server and PHP level. If you are using sharing...
by admin | Jun 2, 2016 | vulnerability |
A remote arbitrary file upload vulnerability found in WP Mobile detector. Users of WP Mobile detector are recommended to update the plugin immediately to version 3.8 onwards. Ref.: Arbitrary File Upload Vulnerability in WP Mobile Detector...
by admin | May 5, 2016 | vulnerability |
ImageMagick is a common graphic library in Linux to manipulate images (e.g. resize, crop, etc). It appears in most gallery functionality. Recently, ImageMagick contains remote arbitrary code execution vulnerability. If your WordPress plugins use ImageMagick,...
by admin | Feb 18, 2016 | vulnerability |
A critical vulnerability was found in glibc recently. glibc is a Linux foundamental C library, which is being shared by a number of Linux program. If you are managing a server (or VPS, or cloud server, or else) with Linux (e.g. CentOS 6, CentOS 7, Debian, …),...
Recent Comments