ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to conduct server side request forgery (SSRF) attacks via a URL in the var_url parameter in a valider_xml action.
Monthly Archives: January 2017
UK’s ICO releases new guidelines for becoming GDPR ready
The UK’s ICO has released a new set of guidelines aimed at ensuring companies are adequately prepared for the introduction of the GDPR.
The post UK’s ICO releases new guidelines for becoming GDPR ready appeared first on WeLiveSecurity
![]()
EMC Isilon OneFS LDAP Injection
EMC Isilon OneFS is affected by an LDAP injection vulnerability that could potentially be exploited by a malicious user to compromise the system. Versions 8.0.0.0, 7.2.1.0 through 7.2.1.2, 7.2.0.x, 7.1.1.0 through 7.1.1.10, and 7.1.0.x are affected.
EMC Documentum Webtop Cross Site Scripting
EMC Documentum Webtop and its client products contain a stored cross site scripting vulnerability that could potentially be exploited by malicious users to compromise the affected system. Various products and versions are affected.
SentryHD 02.01.12e Privilege Escalation
SentryHD version 02.01.12e suffers from a local privilege escalation vulnerability.
MailZu 0.8RC3 Cross Site Scripting
MailZu version 0.8RC3 suffers from a cross site scripting vulnerability.
Red Hat Security Advisory 2017-0123-01
Red Hat Security Advisory 2017-0123-01 – Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, and self-sufficient container that will run virtually anywhere. The following packages have been upgraded to a newer upstream version: docker-latest. Security Fix: The runc component used by `docker exec` feature of docker allowed additional container processes via to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization. An attacker can, depending on the nature of the incoming process, leverage this to elevate access to the host. This ranges from accessing host content through the file descriptors of the incoming process to, potentially, a complete container escape by leveraging memory access or syscall interception.
Red Hat Security Advisory 2017-0127-01
Red Hat Security Advisory 2017-0127-01 – The runC tool is a lightweight, portable implementation of the Open Container Format that provides container runtime. Security Fix: The runc component used by `docker exec` feature of docker allowed additional container processes via to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization. An attacker can, depending on the nature of the incoming process, leverage this to elevate access to the host. This ranges from accessing host content through the file descriptors of the incoming process to, potentially, a complete container escape by leveraging memory access or syscall interception.
Red Hat Security Advisory 2017-0116-01
Red Hat Security Advisory 2017-0116-01 – Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that will run virtually anywhere. The following packages have been upgraded to a newer upstream version: docker. Security Fix: The runc component used by `docker exec` feature of docker allowed additional container processes via to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization. An attacker can, depending on the nature of the incoming process, leverage this to elevate access to the host. This ranges from accessing host content through the file descriptors of the incoming process to, potentially, a complete container escape by leveraging memory access or syscall interception.
Keypatch 2.1
Keypatch is a plugin of IDA Pro for Keystone Assembler Engine.