WordPress 3.5.2 is now available. This is the second maintenance release of 3.5, fixing 12 bugs. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. The WordPress security team resolved seven security issues, and this release also contains some additional security hardening. The security fixes included: […]
Archive for June, 2013
(Jun 18) James Forshaw from Context Information Security discovered several vulnerabilities in xml-security-c, an implementation of the XML Digital Security specification. The Common Vulnerabilities and Exposures project identifies the following problems: [More…]
(Jun 14) Several security issues were fixed in the kernel.
(Jun 14) Several security issues were fixed in the kernel.
(Jun 19) Multiple security issues have been found in HAProxy, a load-balancing reverse proxy: CVE-2012-2942 [More…]
(Jun 19) It was discovered that users with a valid agent login could use crafted URLs to bypass access control restrictions and read tickets to which they should not have access. [More…]
(Jun 18) libKDcraw could be made to crash or run programs as your login if it openeda specially crafted file.
(Jun 19) Multiple security issues were fixed in OpenStack Swift.
(Jun 19) Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical [More…]
(Jun 19) Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having [More…]
(Jun 18) The security update DSA-2628 for nss-pam-ldapd failed to build on kfreebsd-amd64 and kfreebsd-i386. For the oldstable distribution (squeeze) this problem has been fixed in [More…]
(Jun 18) Multiple issues were discovered in the TIFF tools, a set of utilities for TIFF image file manipulation and conversion. CVE-2013-1960 [More…]
(Jun 18) LibRaw could be made to crash or run programs as your login if it opened aspecially crafted file.
(Jun 18) Puppet could be made to run programs if it received specially craftednetwork traffic.
6/18/2013 Houston, TX- cPanel, Inc. announces the impending release of cPanel & WHM software version 11.38. cPanel & WHM software release 11.38, is anticipated to move to the STABLE tier the week of June 24, 2013. This release offers significant improvements to SSL Management and Backups. It also provides enhancements …
(Jun 17) Multiple vulnerabilities were discovered in the dissectors for CAPWAP, GMR-1 BCCH, PPP, NBAP, RDP, HTTP, DCP ETSI and in the Ixia IxVeriWave file parser, which could result in denial of service or the execution of arbitrary code. [More…]
(Jun 14) Several security issues were fixed in the kernel.
(Jun 14) Several security issues were fixed in the kernel.
The following features have been improved:
The following bugs have been fixed:
[-] APS mail packages are now upgraded without errors.
[-] Domains created directly in SmarterMail were deleted when subscriptions with the same domain names were created in PPA.
(Jun 16) Krzysztof Katowicz-Kowalewski discovered a vulnerability in fail2ban, a log monitoring and system which can act on attack by preventing hosts to connect to specified services using the local firewall. [More…]
(Jun 14) Several security issues were fixed in the kernel.
(Jun 14) Several security issues were fixed in the kernel.
We pleased to announce Parallels Plesk Panel upgrade guide!
Here is some further information on the Plesk 9.0 to 9.2.3 phppath
vulnerability that came from further investigation. The flaw is in 9.0 to
9.2.3, but can move forward to later versions on Ubuntu and Debian with certain
non-typical upgrade paths that do not include sequential updating to 9.5.x. See
here for more details: http://kb.parallels.com/116241. Fixes are already issued.
The
following bug has been fixed:
[-] (Debian & Ubuntu) Potential security issue after upgrade from old Plesk
versions.
This MU is strongly recommended for all Parallels Plesk Panel users on Debian
and Ubuntu systems.
The
following bug has been fixed:
[-] (Debian & Ubuntu) Potential security issue after upgrade from old Plesk
versions.
This MU is strongly recommended for all Parallels Plesk Panel users on Debian
and Ubuntu systems.
The
following bug has been fixed:
[-] (Debian & Ubuntu) Potential security issue after upgrade from old Plesk
versions.
This MU is strongly recommended for all Parallels Plesk Panel users on Debian
and Ubuntu systems.
The
following bug has been fixed:
[-] (Debian & Ubuntu) Potential security issue after upgrade from old Plesk
versions.
This MU is strongly recommended for all Parallels Plesk Panel users on Debian
and Ubuntu systems.
The
following bug has been fixed:
[-] (Debian & Ubuntu) Potential security issue after upgrade from old Plesk
versions.
This MU is strongly recommended for all Parallels Plesk Panel users on Debian
and Ubuntu systems.