A malicious unauthenticated user could abuse the lack of authentication check on a particular web service exposed by default in SAP Netweaver JAVA stack, allowing them to fully compromise the targeted system. Affected components include SAP Netweaver JAVA versions 7.30 through 7.50 and LM CONFIGURATION WIZARD versions 7.30 SP019 Patch 0000, 7.30 SP020 Patch 0000, 7.31 SP023 Patch 0000, 7.31 SP024 Patch 0000, 7.31 SP025 Patch 0000, 7.31 SP026 Patch 0000, 7.40 SP018 Patch 0000, 7.40 SP019 Patch 0000, 7.40 SP020 Patch 0000, 7.40 SP021 Patch 0000, 7.50 SP012 Patch 0001 and lower, 7.50 SP013 Patch 0002 and lower, 7.50 SP014 Patch 0001 and lower, 7.50 SP015 Patch 0001 and lower, 7.50 SP016 Patch 0001 and lower, 7.50 SP017 Patch 0001 and lower, and 7.50 SP018 Patch 0000.
978750433543ec4b63047fcf6b6926f902e63282e32e39e3576f962e8997c767
A malicious authenticated attacker, with privileges of SAP SMD Agent access, can exploit certain SAP Host Control functions due to missing input checking, in order to escalate its privileges and execute commands as root/system user. SAPHOSTAGENT versions 7.21 SP045 and lower are affected.
142744fe9b0c3f1be50152d98aa9e05c2d39162094e44f0b5019958cd1b69d8c
Red Hat Security Advisory 2021-1005-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.5.
55f606fda1fdd8113614d742dbdcd2126df792ae0bd743a8a6687a0c2c221e2e
Red Hat Security Advisory 2021-1007-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.5.
9fa865d5c49ad59436533f32b32c3dbbe54f0d77f157b667d2a78f8d11826072
Trojan.Win32.Sharer.h malware suffers from buffer overflow, denial of service, and heap corruption vulnerabilities.
9749da06c749fcbc75e9b2d82ef94a2ed00d5880666cb57629dc109d1d30b044
Mini Mouse version 9.2.0 suffers from a path traversal vulnerability.
9e5e5f36ecd3f806a6cb7ab73e475aa2610e8f26d99edb0638ecc462e4b95937
Mini Mouse version 9.2.0 suffers from a remote code execution vulnerability.
766b0c0592b9ce0622926ea27176ba79c391e31830845ff702aed7a0a43d4bb0
Papoo CMS suffers from a cross site request forgery vulnerability. Versions affected include Papoo Light 21.02 Rev. 04f1ca6 and Papoo Pro 6.0.1 Rev. 4770.
eee7409367352e406312db706f5e4b4989b2af89ed24b84513f196f14d92e75e
Red Hat Security Advisory 2021-1063-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include a null pointer vulnerability.
7fb120b8ac0acdb5293a98b237cbfaf94c9cf4310d85422e72723d6afadad72a
Trojan.Win32.Sharer.h malware suffers from a man-in-the-middle vulnerability.
3571eff48e1facc96be5f92168b3476af981dd36e337022692013a1fa571cc66
OpenEMR version 4.1.0 remote SQL Injection exploit.
ccd74be3fd16945d3d2013767e5c44425bc689a37ff0209b75e8e1f23d50d9ba
Trojan.Win32.Sharer.h malware suffers from a code execution vulnerability.
1d1da1bb68a4041ea9073186362e9f9843f4dbbec1e76a03e5a25c1a4f18bcc7
Red Hat Security Advisory 2021-1006-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.5.
aaddb573063528f736f27fc4f8eab643d64a006e5690cf98a93f2b03d05daf02
Basic Shopping Cart version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
2ca8044f82d151088a3b110f7d35d0acabfc92413ecf7173f4a879fdb6a133a4
Simple Traffic Offense System version 1.0 suffers from a persistent cross site scripting vulnerability.
018d3d49053a49f5bcaf598ec3d48e3061289860b1de635d6d8c79c8de8762b8