Monthly Archives: December 2016
Beta Test the New AVG 2017!
There are very few opportunities in life where you have the opportunity to be among the first to try something, but with AVG 2017 we are giving you that opportunity.
When I read news stories and see a new car concept is being tested or a movie idea tested on an audience I want to put myself in the group that excitedly goes where few have been before. Taking the opportunity to be part of the early adopter group that tests and helps shape a product or service for the masses.
If being first excites you then look no further and download the beta version of AVG’s 2017 product. Experience the new look user interface and the new features that are the result of the two large security companies combining their technology to bring you and exciting new product to keep you secure online.
There are many new features to test. Go now and download the new version, step where no one has stepped before and run the very latest AVG 2017 product. I’ll give you a hint on what’s new and where to start checking, real-time updates, CyberCapture and passive mode are to name but a few of the new features that need to be explored.
We have one ask of you though, share the experience with us and let us know what you think through our beta test forum, so we can make sure when we are ready to release it delivers the best experience.
Vuln: Piwigo CVE-2016-10084 Remote File Inclusion Vulnerability
Piwigo CVE-2016-10084 Remote File Inclusion Vulnerability
Vuln: Piwigo 'admin/plugin.php' Cross Site Scripting Vulnerability
Piwigo ‘admin/plugin.php’ Cross Site Scripting Vulnerability
Vuln: Linux Kernel CVE-2013-6282 Local Privilege Escalation Vulnerabilities
Linux Kernel CVE-2013-6282 Local Privilege Escalation Vulnerabilities
Vuln: Piwigo CVE-2016-10085 Remote File Include Vulnerability
Piwigo CVE-2016-10085 Remote File Include Vulnerability
GLSA 201612-49: mod_wsgi: Privilege escalation
CVE-2016-9913 (qemu)
Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.
CVE-2016-1981 (qemu)
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
CVE-2016-2197 (qemu)
QEMU (aka Quick Emulator) built with an IDE AHCI emulation support is vulnerable to a null pointer dereference flaw. It occurs while unmapping the Frame Information Structure (FIS) and Command List Block (CLB) entries. A privileged user inside guest could use this flaw to crash the QEMU process instance resulting in DoS.