iBall Baton iB-WRA150N remote dns changer exploit.
e911219ab4cd1ab0fd859c251525665fedb2edb1b55a73580efafd350a173e08
APC UPS Daemon versions 3.14.14 and below suffer from a privilege escalation vulnerability.
7883eb46cb295a5d58722ffbbf84eb634440c4fa1de28144bab68e84bac41c2a
EMC VNX1 and VNX2 families suffers from privilege escalation and command injection vulnerabilities.
92bea80932ec25aa71a686858ebeba06efe78caf7eb0988f5b2ab4406792daee
Joomla JoomRecipe extension version 1.0.3 suffers from a remote SQL injection vulnerability.
f71a33c150be44fac2a9f04853133ea994cdb7a3f93e5dca5732011b20dfc77e
Red Hat Security Advisory 2017-1476-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Security Fix: An input validation vulnerability was found in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
8b190ca2757ef3314dbc39727215cfa7703743a900d5f31e1bf88add625f85c0
HPE Security Bulletin HPESBGN03761 1 - A security vulnerability in Linux kernel, also known as "Dirty COW", has been addressed in HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer Virtual appliance. This vulnerability could be exploited remotely to allow escalation of privilege. Revision 1 of this advisory.
0dd6f8226b7bbd3f4d24c1a42590e546556300125d345a6bba2fc7e16c1477d2
Debian Linux Security Advisory 3882-1 - Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system.
636aea4e919cfca3726dc4e0daf39eec211c31193b5893c7bb8a7a1829928f52
nuevoMailer versions 6.0 and below suffer from a remote SQL injection vulnerability.
5c12823df4b47c00cfd710ac6857773af9ef8923cf51f28c088a0a9179d9e5b0
Easy File Sharing Web Server version 7.2 POST buffer overflow exploit with DEP bypass.
8be28bb9525db42044157c5797f6d583798030eb10b9167399d92afefe5cb654
KBVault MySQL version 0.16a suffers from a remote arbitrary file upload vulnerability.
185ebbcc4f4866ecfeee74e287a51d6ffda0b287af520a8f2caba720ebdaa5eb
Bamboo versions prior to 5.15.7 and 6.0.1 suffer from an incorrect permission check.
f665db424dfe7878fbf9a2575c1b4a5604918b34c770adf075efc1af7356cc9e
Mikrotik RouterOS version 6.28 suffers from a cookie HTTP request header buffer overflow vulnerability.
f9094809ee7a54b5ba82c3ce861b12c63658ce45783de7698e9d5d83a472dee0
Mikrotik RouterOS version 6.39.2 suffers from a FTP CWD command buffer overflow vulnerability.
a924ceacde68a55f9ad645ab470c04cb0e869ec8522c44c9e1b6c8e517add61e
Avast aswSnx.sys kernel driver version 11.1.2253 suffers from a memory corruption vulnerability that allows for privilege escalation.
4b059cb64fa6ab746c74284f0a93779fa8c1cf348195a1d979385aa00b69e1c1