WordPress Ninja Forms plugin version 2.9.51 suffers from cross site scripting vulnerabilities.
Monthly Archives: July 2016
Apple Security Advisory 2016-07-18-6
Apple Security Advisory 2016-07-18-6 – iTunes 12.4.2 for Windows is now available and addresses multiple memory corruption vulnerabilities.
Apple Security Advisory 2016-07-18-5
Apple Security Advisory 2016-07-18-5 – Safari 9.1.2 is now available and addresses information disclosure, spoofing, and various other vulnerabilities.
Apple Security Advisory 2016-07-18-4
Apple Security Advisory 2016-07-18-4 – tvOS 9.2.2 is now available and addresses code execution, denial of service, and various other vulnerabilities.
WordPress Icegram 1.9.18 Cross Site Request Forgery
WordPress Icegram plugin version 1.9.18 suffers from a cross site request forgery vulnerability.
Objective Systems Inc. ASN1C For C/C++ Heap Memory Corruption
A heap memory corruption vulnerability exists in the ASN.1 parsing code generated by Objective Systems Inc. ASN1C compiler for C/C++.
Apple Security Advisory 2016-07-18-3
Apple Security Advisory 2016-07-18-3 – watchOS 2.2.2 is now available and addresses code execution, denial of service, and various other vulnerabilities.
Multiple SQL injection vulnerabilities in WordPress Video Player
Posted by Summer of Pwnage on Jul 19
————————————————————————
Multiple SQL injection vulnerabilities in WordPress Video Player
————————————————————————
David Vaartjes & Yorick Koster, July 2016
————————————————————————
Abstract
————————————————————————
It was discovered that WordPress…
Cross-Site Request Forgery in Icegram WordPress Plugin
Posted by Summer of Pwnage on Jul 19
————————————————————————
Cross-Site Request Forgery in Icegram WordPress Plugin
————————————————————————
Yorick Koster, July 2016
————————————————————————
Abstract
————————————————————————
A Cross-Site Request Forgery vulnerability was found in the Icegram…
Apple Security Advisory 2016-07-18-2
Apple Security Advisory 2016-07-18-2 – iOS 9.3.3 is now available and addresses denial of service, code execution, and various other vulnerabilities.