Pydio Cells version 2.0.4 suffers from cross site scripting, file write, code execution, and various other vulnerabilities.
37f85d55bff56ee29347e72ef5b07144
CipherMail Community Virtual Appliance version 4.6.2 suffers from remote command execution and file injection vulnerabilities.
1e03b7ce73404f389184d11c6489d8e8
RoyalTS SSH Tunnel versions prior to 5 for Windows suffer from an authentication bypass vulnerability.
b6681831bdab8f59c11f696914a669a3
Joomla J2 Store version 3.3.11 suffers from an authenticated remote SQL injection vulnerability.
bcb67b2a060b4dca741c446a88d6159a
WebUntis versions 2020.12.1 and below suffer from a persistent cross site scripting vulnerability.
226a393a86c5ac19e4e242b09ff73bba
Red Hat Security Advisory 2020-2433-01 - The microcode_ctl packages provide microcode updates for Intel and AMD processors.
16c56b243572e12ef2dcff759a9b90a3
Red Hat Security Advisory 2020-2427-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
d8858e44e9d450f8ec83e0c08a33b48a
Red Hat Security Advisory 2020-2429-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer, privilege escalation, and use-after-free vulnerabilities.
7c78c0ea2fce01bfef663dda2ee1cba1
Red Hat Security Advisory 2020-2428-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
642602ae3637bf3ea48231dbdbd76ac9
Red Hat Security Advisory 2020-2431-01 - Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
15aaa02ebf2d509adc0df4f61d004a20
haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.
6c2938639e41f2ccc29ce6a5a9ede993
Gentoo Linux Security Advisory 202006-1 - An information disclosure vulnerability in GnuTLS allow remote attackers to obtain sensitive information. Versions less than 3.6.14 are affected.
6846b303f654b57b93a753ac75da510f
75 bytes small Linux/x86 tiny read polymorphic shellcode.
d6f58fd7c7c280218ab60f1656e524b7
Bandwidth Monitor version 3.9 full ROP buffer overflow exploit with SEH, DEP, and ASLR taken into consideration.
e485411f8850c19591908825d56fde0f
Bludit version 3.9.12 suffers from a directory traversal vulnerability.
58e30747011aa13fe7bddb3f9412d0d7
Virtual Airlines Manager version 2.6.2 suffers from a remote SQL injection vulnerability.
9a7ac79a2513a6118e16166897efe858
Whitepaper called IOT Firmware Analysis that walks through extraction and analysis.
8c3ce69d6e5de0e141fc6ab5c75b639b
Whitepaper called Exploiting Unrestricted File Upload via Plugin Uploader in WordPress.
82ef663315bfdc3aa371270f39bd15b1