Tag
#redis
RRX IOB LP version 1.0 suffers from a DNS cache snooping vulnerability.
WiFi File Transfer version 1.0.8 suffers from a cross site scripting vulnerability.
Backdoor.Win32.Redkod.d malware suffers from a hardcoded credential vulnerability.
Webile version 1.0.1 suffers from a directory traversal vulnerability.
Backdoor.Win32.DarkSky.23 malware suffers from a buffer overflow vulnerability.
anji-plus AJ-Report 0.9.8.6 allows remote attackers to bypass login authentication by spoofing JWT Tokens.
Data importation mechanism failed to sanitize imports
Authenticated (admin+) Reflected Cross-Site Scripting (XSS) vulnerability in Gabe Livan's Asset CleanUp: Page Speed Booster plugin <= 1.3.8.4 at WordPress.
Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.
XAPI open file limit DoS It is possible for an unauthenticated client on the network to cause XAPI to hit its file-descriptor limit. This causes XAPI to be unable to accept new requests for other (trusted) clients, and blocks XAPI from carrying out any tasks that require the opening of file descriptors.