Sites that use the Gutenberg (found in WordPress 5.0 to 5.2.2) are open to complete takeover.
A new attack on Intel server-grade CPUs could allow the leakage of SSH passwords – but luckily it’s not easy to exploit.
September Patch Tuesday leads off with two elevation-of-privilege bugs that have been exploited in the wild.
Overall Adobe’s September security update addressed vulnerabilities in Flash Player and Application Manager.
Flaws can potentially affect every device and user on the network by directing them to malicious websites or blocking their access to important data or resources.
Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.
A critical vulnerability found in Exim servers could enable a remote, unauthenticated attacker to execute arbitrary code with root privileges.
Large portions of APT3’s remote code-execution package were likely reverse-engineered from prior attack artifacts.
The zero-day vulnerability could enable privilege escalation, and is not part of Google’s Android September security update.
The AK-EM 800 software from Danfoss centralizes alarm management, automatic data collection and food-quality reporting.