Vulnerabilities analysis for 30Dec2015 (No action required)

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4149
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Vulnerabilities analysis for 30Dec2015 (No action required)

Unread post by mikeshinn »

This report is an analysis of all published vulnerabilities, weakenesses and exploits Internet wide, and how our products protect our customers from these vulnerabilities, weaknesses and exploits.

Please see this forum post for an explanation of the categories used in this report

ASL users

Summary: No update required, you are already immune from all vulnerabilities/CVEs below

Already protect against/Known Method/No update required

Beezfud Remote Code Execution
WordPress Simple Ads Manager 2.9.4.116 SQL Injection
KODExplorer Web File Manager Cross Site Scripting
CVE-2015-7782
CVE-2015-7791

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

Rules only users

Summary: No update required, you are already immune from all vulnerabilities/CVEs below

Already protect against/Known Method/No update required

Beezfud Remote Code Execution
WordPress Simple Ads Manager 2.9.4.116 SQL Injection
KODExplorer Web File Manager Cross Site Scripting
CVE-2015-7782
CVE-2015-7791

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.
Post Reply