GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.
89ae585973d5671dd7de7fce250978f6d6663739a8d09d6a194984018abf6165
Ecessa ShieldLink SL175EHQ version 10.7.4 suffers from an add superuser cross site request forgery vulnerability.
5cc4b074d5af1b150d7925eb5d77aa54a0146fc3c23b9644b4d72c74d23cc8aa
Ecessa WANWorx WVR-30 version 10.7.4 suffers from an add superuser cross site request forgery vulnerability.
62c07f7b254f3a6ce8a21457ddf801f96a6c3d50e43e8a0558fc0ffaeca24c4d
Ecessa Edge EV150 version 10.7.4 suffers from an add superuser cross site request forgery vulnerability.
4f74f98f4865e02f46d175bb9446106924075340a1808f6f2da019f58f0929a2
Red Hat Security Advisory 2018-1975-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR5-FP15. Issues addressed include a deserialization vulnerability.
8195fccd479514f27690fbfaf526994432154f6f8c773640850c17eae2361e26
Debian Linux Security Advisory 4234-1 - Two vulnerabilities were discovered in LAVA, a continuous integration system for deploying operating systems for running tests, which could result in information disclosure of files readable by the lavaserver system user or the execution of arbitrary code via a XMLRPC call.
4b36bb80b9eff7fda1252931c9c7609bbbf15d6d56fbd6dcf6993945219b4394
Digisol DG-BR4000NG suffers from a cross site scripting vulnerability.
403454afe70a151672a21b8cb3a9e4bf518534299f9b53c0bfd09f55fe0d1c54
Intex Router N-150 suffers from an add admin cross site request forgery vulnerability.
0cddaf5d95a9539a3cdef00fd49c5f4a82243e1b5830ec1c557016a7f9f09470
WordPress Advanced Order Export for WooCommerce plugins versions prior to 1.5.4 suffer from a CSV injection vulnerability.
b442bfc1ff5a550668767180da731e6414671e0ecaa40bad1a7e49e4990151ae
Digisol DG-BR4000NG buffer overflow proof of concept exploit.
dac99d336f857ce13743c116d4e127f6b0b03e4118792e8bc6547d08f6ca4be2
Foxit Reader version 9.0.1.1049 suffers from a remote code execution vulnerability.
bf72b6326ebb4c4437a3f788a33ad75112bc77e87bca036144808a27a94871f6
WordPress iThemes Security plugin versions prior to 7.0.3 suffer from a remote SQL injection vulnerability.
107663c120501616b8eb96371f4388f40e15818b829af2e9c65a7a05bc9016d1
WordPress Comments Import and Export plugin versions prior to 2.0.4 suffer from a CSV injection vulnerability.
dd726e7afd5756b20eab3a209cfe55c9eaee45075174c01a420cc8ca9eea7330
Intex Router N-150 suffers from a remote arbitrary file upload vulnerability.
41f7b18f0ddc4a27bac0aab0fa06a2941cfae7193e219a23716bcf83456465cd
AsusWRT RT-AC750GF suffers from a cross site request forgery vulnerability in the change admin password flow.
363560f7c28221e14f216c3e9133cd294040a8d4e3874784d921d8085a9c6803
When KVM (on Intel) virtualizes another hypervisor as L1 VM it does not verify that VMX instructions from the L1 VM (which trigger a VM exit and are emulated by L0 KVM) are coming from ring 0.
e4f92891c53308037346815989f93e355401e22ad52a077945971a06a625d400
Red Hat Security Advisory 2018-1974-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR4-FP25. Issues addressed include a deserialization vulnerability.
845e1273b91ea122e2412665711776fc99d8d94609b34d54213ab9e3c6cfcc70
Red Hat Security Advisory 2018-1972-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Issues addressed include bypass and code execution vulnerabilities.
b140dd006daf760c636deaa14803fc48a9e08b6f5c14a57c32fa7e771317d912
Debian Linux Security Advisory 4233-1 - It was discovered that the low-level interface to the RSA key pair generator of Bouncy Castle (a Java implementation of cryptographic algorithms) could perform less Miller-Rabin primality tests than expected.
dcbba3a290782dccb23af4e8190fd52a91230c8057b760f300fecdae85ecaae6