Red Hat Enterprise Linux: An update for flash-plugin is now available for Red Hat Enterprise Linux 6Supplementary.Red Hat Product Security has rated this update as having a security impact ofCritical. A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. CVE-2018-4919, CVE-2018-4920
More info:
http://rhn.redhat.com/errata/RHSA-2018-0520.html
Type: Vulnerability. Microsoft SharePoint Server is prone to a remote privilege-escalation vulnerability; fixes are available.
More info:
http://www.symantec.com/security_response/vulnerability.jsp?bid=103280&om_rssid=sr-advisories
Red Hat Enterprise Linux: An update for dhcp is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. CVE-2018-5732, CVE-2018-5733
More info:
http://rhn.redhat.com/errata/RHSA-2018-0483.html
Red Hat Enterprise Linux: An update for bind is now available for Red Hat Enterprise Linux 7.2 AdvancedUpdate Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, RedHat Enterprise Linux 7.2 Update Services for SAP Solutions, and Red HatEnterprise Linux 7.3 Extended Update Support.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for
More info:
http://rhn.redhat.com/errata/RHSA-2018-0488.html
BIG-IQ Access Manager role vulnerability CVE-2017-6152. Security Advisory. Security Advisory Description. A local BIG-IQ ...
More info:
https://support.f5.com/csp/article/K35195140
A Certification Authority (CA) is an organization that browser vendors (like Mozilla) trust to issue certificates to websites. Last year, Mozilla published and discussed a set of issues with one of the oldest and largest CAs run by Symantec. The … Continue readingThe post Distrust of Symantec TLS Certificates appeared first on Mozilla Security Blog.
More info:
https://blog.mozilla.org/security/2018/03/12/distrust-symantec-tls-certificates/
Red Hat Enterprise Linux: An update for bind is now available for Red Hat Enterprise Linux 6.4 AdvancedUpdate Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red HatEnterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 TelcoExtended Update Support, and Red Hat Enterprise Linux 6.7 Extended UpdateSupport.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa
More info:
http://rhn.redhat.com/errata/RHSA-2018-0487.html
Apache Tomcat vulnerability CVE-2018-1304. Security Advisory. Security Advisory Description. The URL pattern of "" (the ...
More info:
https://support.f5.com/csp/article/K04623854
Red Hat Enterprise Linux: An update for chromium-browser is now available for Red Hat Enterprise Linux 6Supplementary.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. CVE-2018-6057, CVE-2018-6060, CVE-2018-6061, CVE-2018-6062, CVE-2018-6063, CVE-2018-6064, CVE-2018-6065,
More info:
http://rhn.redhat.com/errata/RHSA-2018-0484.html
Project: Joomla! SubProject: CMS Impact: High Severity: Low Versions: 3.5.0 through 3.8.5 Exploit type: SQLi Reported Date: 2018-March-08 Fixed Date: 2018-March-12 CVE Number: CVE-2018-8045 Description The lack of type casting of a variable in SQL statement leads to a SQL injection vulnerability in the User Notes list view Affected Installs Joomla! CMS versions 3.5.0 through 3.8.5 Solution Upgrade to version 3.8.6 Contact The JSST at the Joomla! Security Centre. Reported By: Entropy Moe
More info:
http://feeds.joomla.org/~r/JoomlaSecurityNews/~3/lncFKmG4klo/723-20180301-core-sqli-vulnerability.html