– Update to 1.0.2
Release notes:
http://www.cacti.net/release_notes_1_0_0.php
http://www.cacti.net/release_notes_1_0_1.php
http://www.cacti.net/release_notes_1_0_2.php
– Update to 1.0.2
Release notes:
http://www.cacti.net/release_notes_1_0_0.php
http://www.cacti.net/release_notes_1_0_1.php
http://www.cacti.net/release_notes_1_0_2.php
Qemu: net: mcf_fec: infinite loop while receiving data in mcf_fec_receive
[CVE-2016-9776]
Qemu: audio: memory leakage in ac97 [CVE-2017-5525]
Qemu: audio: memory leakage in es1370 device [CVE-2017-5526]
oob access in cirrus bitblt copy [XSA-208, CVE-2017-2615]
Latest stable upstream release, includes security fix for CVE-2017-5593
Latest stable upstream release, includes security fix for CVE-2017-5593
New release (1.10a). Security fix for CVE-2016-6265
Security fix for CVE-2016-6265
Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
An issue was discovered in caddy (for TYPO3) before 7.2.10. The vulnerability exists due to insufficient filtration of user-supplied data in the “paymillToken” HTTP POST parameter passed to the “caddy/Resources/Public/JavaScript/e-payment/paymill/api/php/payment.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
An issue was discovered in ionize through 1.0.8. The vulnerability exists due to insufficient filtration of user-supplied data in the “path” HTTP GET parameter passed to the “ionize-master/themes/admin/javascript/tinymce/jscripts/tiny_mce/plugins/codemirror/dialog.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
An issue was discovered in Emoncms through 9.8.0. The vulnerability exists due to insufficient filtration of user-supplied data in multiple HTTP GET parameters passed to the “emoncms-master/Modules/vis/visualisations/compare.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.