Security

Page 2

WHMCS Security Advisory TSR-2015-0001

WHMCS has released new updates for all supported versions of WHMCS. These updates include changes that address security concerns within the WHMCS product. WHMCS has rated these updates as having a...

Read more »

By Andrew

WHMCS Security Advisory TSR-2014-0003

WHMCS has released new updates for all supported versions of WHMCS. These updates include changes that address security concerns within the WHMCS product. WHMCS has rated these updates as having a...

Read more »

By Matt

"Heartbleed Bug" OpenSSL Vulnerability Affecting Internet Community

Summary The Heartbleed bug (https://en.wikipedia.org/wiki/Heartbleed_bug) is a serious vulnerability in OpenSSL 1.0.1 through 1.0.1.f. This vulnerability allows an attacker to read chunks of memory...

Read more »

By Matt

WHMCS Security Advisory TSR-2014-0002

WHMCS has released new updates for all supported versions of WHMCS. These updates include changes that address security concerns within the WHMCS product. WHMCS has rated these updates as having a...

Read more »

By Matt

WHMCS Security Advisory TSR-2014-0001

WHMCS has released a new update for all supported versions of WHMCS. These updates contain changes that address security concerns within the WHMCS product. We recommend you update your WHMCS...

Read more »

By Matt

WHMCS Security Advisory TSR-2013-010

WHMCS has released a new update for all supported versions of WHMCS. This update contains a change that addresses a specific security concern within the WHMCS product. We strongly encourage you to...

Read more »

By Matt

WHMCS Security Advisory TSR-2013-009

WHMCS has released new updates for all supported versions of WHMCS. These updates contain changes that address security concerns within the WHMCS product. We strongly encourage you to update your...

Read more »

By Matt

Security Threat Notification

We are aware of a post that is circulating in which the author proposes an exploit via a cookie variable. However the proposed vulnerability is only possible if the attacker has gained access to a...

Read more »

By Matt