Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
9a8e6e49a1688dae64dca10f84a414ec9a4f393fb2256ae28e0c2e3239185ab1
Joomla PHP-Bridge component version 1.2.3 suffers from a remote SQL injection vulnerability.
fc71081fde3cc09b35f9d90517f63e8edfd2ed5ab433d21fe734462b33a23fbf
Joomla SIMGenealogy component version 2.1.5 suffers from a remote SQL injection vulnerability.
887b1d0c077e9ead3bf81588d2bb70b1f3a31566f661510272f843c359c76b3b
Solarwinds Kiwi Syslog version 9.6.1.6 suffers from a denial of service vulnerability.
d327e9a95e452d485fb1410499326bd9f1702a0b1231d22b6283afe818790665
Joomla LMS King Professional component version 3.2.4.0 suffers from a remote SQL injection vulnerability.
bda9c2d39254e0e4a59589b389ca75a51a3c49040cfd1a463888dffbb2304a11
Joomla Event Registration Pro Calendar component version 4.1.3 suffers from a remote SQL injection vulnerability.
6fa433ccdd43ca1288ef9c62a8dee4f01a7af922c18121f0dae6050d7b608834
Joomla Ultimate Property Listing component version 1.0.2 suffers from a remote SQL injection vulnerability.
7c0612b2a1fd992d84a3e985c60931441d8980f30dc08bcefaea3891c5683657
Microsoft Windows 10 Pro SMBLoris denial of service exploit that takes down a fully patched system with 8 gigs of ram in less than 10 seconds.
1b9c170c01a954fcbfb0782f40f9b81488a525099edca26c9e23df3eaa2da440
IBM Worklight Enterprise Edition and IBM MobileFirst Platform Foundation versions 6.1, 6.2, 6.3, 7.0, 7.1, and 8.0 suffer from an oauth server web api cross site scripting vulnerability.
ac2c77a8bdb6c370f45b4b0b66378e012aabed585ad9569f4b364a073cc1ba62
Hashicorp vagrant-vmware-fusion versions 4.0.23 and below suffer from a local privilege escalation vulnerability.
57d922a06016c64b075c9ef6ef58589b35c5f6977ff557cba09e9f8701542be9
Ubuntu Security Notice 3375-1 - It was discovered that LXC incorrectly handled the TIOCSTI ioctl. An attacker could possibly use this issue to escape LXC containers.
e3ae3fe9f73f26f31cc9cd758967923d7be395b2f923a28622c56e6647f22433
Ubuntu Security Notice 3376-1 - A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
abdc4faca50ca683c22677a76bbb17763bdbcb5833e6164885683f51b7f2da7f
Debian Linux Security Advisory 3924-1 - A denial of service vulnerability was discovered in Varnish, a state of the art, high-performance web accelerator. Specially crafted HTTP requests can cause the Varnish daemon to assert and restart, clearing the cache in the process.
eec3cab8691cf6819a0aac4586493b8442045b55c36e9f107e124a9ffa6c91cf
Red Hat Security Advisory 2017-2412-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
aa9857da1c4e8d78eaae8965f451e5860e451e2d5043fd8893450a983fd25a9d
Slackware Security Advisory - New gnupg packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
ac7b53ebf1c3f9b75baf51f26cc313718a5582023389ed40e6ad93f7bd09168f
HPE Security Bulletin HPESBHF03763 1 - A potential security vulnerability has been identified in Comware 7, IMC, VCX products using OpenSSL. The vulnerability could be remotely exploited to allow a denial of service. Revision 1 of this advisory.
dd90f3774a636d9a02b6b19489b9140bcc74ec400ed8e03d4f0760a175b70415
Red Hat Security Advisory 2017-1758-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components.
c5a356b12df6d45766811619de3bb527123103b89c8c18ed2f2796286f594d78
HPE Security Bulletin HPESBGN03766 1 - A potential security vulnerability has been identified in HPE Project and Portfolio Management(PPM) product. The vulnerability could be exploited to allow remote cross-site scripting (XSS). Revision 1 of this advisory.
95661b488cdbb0398e92018f5333222cec278c771ca878bbd7b6bd05f435c0a1
Technicolor TC7337 suffers from a persistent cross site scripting vulnerability through the SSID of nearby Wi-Fi devices.
a22b1ed822cb57180d1799159862447952bd9fc020dbf7440fa4a1f272d39ac2
Entrepreneur B2B script suffers from a remote SQL injection vulnerability.
918e816a9e87ae12352e4a78711f05005ff28ee1f9d66334e4211141d096d578