Ubuntu Security Notice 5295-1 - It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered a race condition in the Unix domain socket implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
b547d8a973a224e901b06eaeedecd20d12b7bfbede9c1be88b6689532cb1a805
WordPress MasterStudy LMS plugin version 2.7.5 suffers from a missing access control allowing an unauthenticated party the ability to create an administrative account.
a3a490fa31272315dc3b33abac3a970e548d08d2ce2376d9748f5e401a62604f
WordPress UpdraftPlus versions 1.16.7 through 1.22.2 suffer from a backup disclosure vulnerability.
b497726806b3d3cd3a57bcd3b91fab0d6c64ec521a48183b3477b06789862f15
Ubuntu Security Notice 5292-3 - USN-5292-1 fixed several vulnerabilities in snapd. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue to expose sensitive information. Ian Johnson discovered that snapd did not properly validate content interfaces and layout paths. A local attacker could possibly use this issue to inject arbitrary AppArmor policy rules, resulting in a bypass of intended access restrictions. The Qualys Research Team discovered that snapd did not properly validate the location of the snap-confine binary. A local attacker could possibly use this issue to execute other arbitrary binaries and escalate privileges. The Qualys Research Team discovered that a race condition existed in the snapd snap-confine binary when preparing a private mount namespace for a snap. A local attacker could possibly use this issue to escalate privileges and execute arbitrary code.
23fb2407472813360c266bf4444366a9b1f39826d88b86b3b54675092a32d4ec
WordPress dzs-zoomsounds plugin version 6.60 suffers from a remote shell upload vulnerability.
6e96492b3bf0c53feb2e28da2e7826b4b660705ff00d0ce838e33bbfbb07bf95
Ubuntu Security Notice 5292-2 - USN-5292-1 fixed vulnerabilities in snapd. This update provides the corresponding update for the riscv64 architecture. James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue to expose sensitive information.
0c6bd21fafc633dfdaa09088d54dc04cc7a81354d0f9a2be6b57f8f4dccd6efa
Fortinet Fortimail version 7.0.1 suffers from a cross site scripting vulnerability.
7f8798b7aa7700d879a636522b5f36adeafdc2272b48d2974f728dabead950cd
Ubuntu Security Notice 5294-1 - It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
1366df82d8fcd6815d5088e53ffe7f4c0a5200426d7806e8827105451bd46108
Ubuntu Security Notice 5292-1 - James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue to expose sensitive information. Ian Johnson discovered that snapd did not properly validate content interfaces and layout paths. A local attacker could possibly use this issue to inject arbitrary AppArmor policy rules, resulting in a bypass of intended access restrictions.
cd903c8b5359411ecb8e840d467ea204ce37f54e4b2751f2d53a192802d1ce9d
Hotel Druid version 3.0.3 suffers from a remote code execution vulnerability.
7744db6e72d7f36eeaaf02fcc2e34ca731580136eb6a6685b03172941236ce62
Red Hat Security Advisory 2022-0580-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Issues addressed include a traversal vulnerability.
14e508f8b5ba4605bd8db42f72278f20a3b7e049cd664a90973860fae75556f7
Whitepaper called OPENSSLDIR - The adventures of hidden folder to privilege escalation.
169de44bba1064b1fdf63754db8a9eba9c5bd777fa8e4e5dd12cb47dfe4af528
Cosmetics and Beauty Product Online Store version 1.0 suffers from a remote SQL injection vulnerability.
8c96834a21c7c1412cd4faf4cbbcbefa7d9d6c0ab4c866b01e5136099c7e1647
Cosmetics and Beauty Product Online Store version 1.0 suffers from an html injection vulnerability that may allow for cross site scripting attacks.
57638540f832830c3b440d78b2f5475814d86031a79a01dbb9864f7e31ab7ac5
64 bytes small Solaris/SPARC setuid(0) + chmod (/bin/ksh) + exit(0) shellcode.
ac0a8ce6fdd207649a67626e1818a1afd680783d1a46fb94677718a1d1994210
60 bytes small Solaris/SPARC setuid(0) + execve (/bin/ksh) shellcode.
d785c150823ddd32cb42d29580182ea9055608bea403fff7662eca6bf006f946
Linux/MIPS N32 MSB reverse shell shellcode that showcases various techniques to avoid badchars.
b1b0100dc2ab1910886ea650ac52df457851a4b14a3d07a98e33678c077b6d6e
Solaris/SPARC chmod() shellcode with a max size of 36 bytes.
844bef47108ea6b399c1949416ca0526422e2fc8ce504d583c3f36aaa4144470
TOSHIBA DVD PLAYER Navi Support Service version 1.00.0000 suffers from an unquoted service path vulnerability.
2cc1d1500b86df40a56c75f038edc816da6770b8e20d92d568bd6cf54a307371
Bluetooth Application version 5.4.277 suffers from an unquoted service path vulnerability.
64649e4b03d676074e058a4bea1629b478b9bf31f364383beb81f3e04a484dd8
File Sanitizer for HP ProtectTools version 5.0.1.3 suffers from an unquoted service path vulnerability.
75b26f7c0d16235054a3bca106f8e5ac092ce5691cfad937f93f63af339eb225
Intel Management Engine Components version 6.0.0.1189 suffers from an unquoted service path vulnerability.
aa2df716adf81cc23d4c42c366ac98e98cb2749914b61ff2e6120564771c8fa8
Connectify Hotspot 2018 suffers from an unquoted service path vulnerability.
5c8e18583e7d44bd1da428fa8bcf86559a8aafd3b288374ca36284015731ccc2
Wondershare Dr.Fone version 11.4.9 suffers from an unquoted service path vulnerability.
106d0419943583c10a56662e06074859f3acce2402478d51934b850d8ab8a3dd
Wondershare MobileTrans 3.5.9 suffers from an unquoted service path vulnerability.
08be95dd8b24bfc66887fde06b5d3154e9353d19ee69f3fce7e7a634c84bd765