The Microsoft .NET Framework contains an error in the Intermediate Language (IL) verifier which could allow hosted partial trust code to elevate privileges to escape a sandboxed environment resulting in arbitrary code execution with the permissions of the user. Affected are Microsoft .Net Frameworks versions 1.1 through 4.5.
079e079043b920220d28f1a88dcf3dd9d69b471f51c59bc6253d0bd339e455ac
Citrix XenServer version 5.0 through 6.0.2 suffer from a privilege escalation vulnerability.
eb3974e68da4195443054f477c4bf3f18f7d35f86b9ec8a0799c51acbb0c4459
.NET versions 1.0 through 4 suffer from a remote code execution vulnerability.
307f395b028ac122304fef534240c7e23084013f6280c7430f0e184b83090603
SAP AG Netweaver version 7.02 suffers from a stack based buffer overflow vulnerability in the SAPHostControl service. Exploitation can lead to code execution.
96012632a04d7e30153723120084472f3f130485461ca0a85ad16a64e3a5da2f
Context discovered a security vulnerability which allows for Apache in reverse proxy mode to be used to access internal/DMZ systems due to a weakness in its handling of URLs being processed by mod_rewrite. Versions 1.3 and 2.x are affected.
cc7c3ff195e475a2b7ec8ea66d98deaebf0cf9dedd7ae209991e3d3c5d4274d8
Context discovered two memory corruption issues related to Firefox code that processes WebGL, that could result in remote code execution via a malicious web page. Heap overflows make use of the WebGL shader compiler and the ANGLE library. Versions 4.0.1 and 5 are affected.
e2a6dbc735d5a7f645b6a0736a8b929cdad5127974443db6a2057209e4c009f7