RACK911 Labs

  • Home
  • Services
    • Penetration Testing
    • IOT Security
    • Tech Security
    • Server Auditing
    • Incident Response
  • Security Advisories
  • Security Research
  • About Us
  • Contact Us

MariaDB – MyiSAM/Aria Temporary Files Arbitrary File Delete Vulnerability

Security Advisories

Product Description: MariaDB Server is one of the most popular database servers in the world. It’s made by the original developers of MySQL and guaranteed to stay open source. Notable users include Wikipedia, WordPress.com and Google. MariaDB turns data into structured information in a wide array of applications, ranging from banking to websites. Originally designed […]

Read More

Eset Cyber Security (Mac OS X) – Arbitrary File Overwrite Vulnerability

Security Advisories

Product Description: ESET® Cyber Security delivers fast, powerful protection to your Mac, helping you enjoy safer technology. On the Internet, your personal data is secured against theft by Anti-Phishing. The solution is designed to look after your security, while not getting in your way– ESET Cyber Security’s low system footprint takes care of that. Vulnerability […]

Read More

Norton Security (Mac OS X – Symantec AV Engine) – Arbitrary File Deletion Vulnerability

Security Advisories

Product Description: Norton™ Internet Security for Mac protects your Mac from virus and malware via advanced scanning and detection technologies. Vulnerability Discussion: Symantec AV Engine (Mac endpoints only) may be susceptible to an arbitrary file deletion issue, which is a type of vulnerability that could allow an attacker to delete files on the resident system […]

Read More

AVG Antivirus (Mac OS X) – Arbitrary File Overwrite Vulnerability

Security Advisories

Product Description: AVG AntiVirus is a family of antivirus software developed by AVG Technologies, a subsidiary of Avast. It is available for Windows, macOS and Android. Vulnerability Discussion: The HUB component of AVG for Mac OS X contains a vulnerability that would allow a malicious user to overwrite any file under the operating system by […]

Read More

ESET File Security (Linux / FreeBSD) – Arbitrary File Deletion

Security Advisories

Product Description: Safeguard your Linux, BSD, and Solaris file servers with ESET File Security’s real-time protection from known and emerging threats. With ESET, you will never have to choose between security and performance. Vulnerability Discussion: Malware under certain circumstances can trigger an Arbitrary File Deletion which could cause any file on the server, including root […]

Read More

MySQL Server – Database Creation Denial Of Service (CVE-2019-2537)

Security Advisories

Product Description: MySQL is the world’s most popular open source database. Whether you are a fast growing web property, technology ISV or large enterprise, MySQL can cost-effectively help you deliver high performance, scalable database applications. Vulnerability Discussion: If a user creates a specific database name it can cause MySQL to fail upon a restart. The […]

Read More

F-Secure Linux Security – FSC-2018-3 (Security Advisory)

Security Advisories

Product Description: F-Secure Linux Security provides core security capabilities for Linux environments: multi-engine anti-malware and built-in firewall management, in addition to vital Integrity Checking for endpoints and servers. Vulnerability Discussion: It is possible for a local non-root user to cause arbitrary system files to be renamed to *.virus, leading to a permanent corruption (DoS) of […]

Read More

McAfee Endpoint Security (Linux) – CVE-2018-6693

Security Advisories

Product Description: McAfee Endpoint Security delivers centrally managed defenses with integrated capabilities like endpoint detection and response and machine learning analysis. Protect your Windows, Mac, and Linux systems with multiple, collaborative defenses and automated responses. Vulnerability Discussion: An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix […]

Read More

cPanel – Exim Valiases Arbitrary File Read Security Vulnerability

Security Advisories

Product Description: cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators. Vulnerability Discussion: When processing the valiases for a […]

Read More

WHMCS – Admin Application Links CSRF Vulnerability

Security Advisories

Product Description: WHMCS is an all-in-one client management, billing & support solution for online businesses. Handling everything from signup to termination, WHMCS is a powerful business automation tool that puts you firmly in control. Vulnerability Discussion: Due to a CSRF vulnerability within the “Application Links” feature in the admin panel of WHMCS, it is possible […]

Read More

Posts navigation

1 2 3 Next

HOSTINGSECLIST

Get notified of the latest security threats via our mailing list.

https://www.HostingSecList.com

SERVICES

  • Penetration Testing
  • IOT Security
  • Tech Security
  • Server Auditing
  • Incident Response
  • Secure Hosting

CONTACT

110-1110 Palms Airport Drive
Las Vegas, NV 89119
[email protected]

  • Privacy Policy
  • Disclosure Policy