Several issues have been discovered in ImageMagick, a popular set of
programs and libraries for image manipulation. These issues include
several problems in memory handling that can result in a denial of
service attack or in execution of arbitrary code by an attacker with
control on the image input.
Monthly Archives: November 2016
Vuln: Multiple IBM Products CVE-2016-2864 Cross Site Scripting Vulnerability
Multiple IBM Products CVE-2016-2864 Cross Site Scripting Vulnerability
Vuln: Multiple IBM Products CVE-2016-0325 Remote Command Injection Vulnerability
Multiple IBM Products CVE-2016-0325 Remote Command Injection Vulnerability
Vuln: IBM Security Privileged Identity Manager CVE-2016-0353 Information Disclosure Vulnerability
IBM Security Privileged Identity Manager CVE-2016-0353 Information Disclosure Vulnerability
dpkg-1.16.18-2.el6
Security fix for CVE-2015-0860 and add start-stop-daemon
dpkg-1.17.27-1.el7
New upstream vesion, 1.17.27 . Security fix for CVE-2015-0860
dpkg-1.17.27-1.fc23
New upstream vesion, 1.17.27 . Security fix for CVE-2015-0860
dpkg-1.17.27-1.fc24
New upstream vesion, 1.17.27 . Security fix for CVE-2015-0860
dpkg-1.17.27-1.fc25
New upstream vesion, 1.17.27, Security fix for CVE-2015-0860
Popular call blocking apps expose 3 billion users' phone numbers
Photo: FactWire
Truecaller, CM Security, and Sync.ME, three popular caller blocking and ID apps used by millions of customers, have just been outed for storing the contact details of three billion people in publicly searchable databases. According to Digital Journal, research published earlier this week by Factwire, a group of investigative journalists in Hong Kong, said that the mobile phone numbers of politicians, celebrities, and billions of other people, can be found via searches on the app publisher’s websites.
![]()