Digitalstrom Konfigurator version 1.10.0 suffers from cross site request forgery and cross site scripting vulnerabilities.
c1222ada6c904eee3c1aae5b05d9e712fcff0d0139e72dc176f4270549e20f32
my devolo version 1.2.8 suffers from an insecure data storage vulnerability.
415a9667d7875e4ffab1d65d9e2cf1a4f4419c8a28f4fcc72dddbb4c9b7a0e90
HP Security Bulletin HPSBMU03573 1 - A potential security vulnerability has been identified with HPE System Management Homepage (SMH) on Windows and Linux. The vulnerability could be exploited remotely resulting in disclosure of information. Revision 1 of this advisory.
0f9a8afa3e02fde39f49085d5941c36ef63fb1b0db9a70d41a775c34c9b30791
HP Security Bulletin HPSBGN03580 1 - Potential security vulnerabilities have been identified in HP Data Protector that could allow the remote execution of code or the unauthorized disclosure of information. Revision 1 of this advisory.
fe555940ce11a58464ddf248fb5f34613b1577e3c29742dd8f78b82baddfc1de
Debian Linux Security Advisory 3553-1 - Regis Leroy from Makina Corpus discovered that varnish, a caching HTTP reverse proxy, is vulnerable to HTTP smuggling issues, potentially resulting in cache poisoning or bypassing of access control policies.
bc657fff411ae02e679a1648904473ae77ce5c8698e470789184f8f669a61b43
Debian Linux Security Advisory 3554-1 - Multiple vulnerabilities have been discovered in the Xen hypervisor.
eaab15a54a41ea6970b80c6129c79cc7bf582d226649ce50c14c4881102bb949
This Metasploit module exploits an arbitrary file upload vulnerability found in Advantech WebAccess 8.0. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebAccess Dashboard Viewer. Insufficient validation within the uploadImageCommon function in the UploadAjaxAction script allows unauthenticated callers to upload arbitrary code (instead of an image) to the server, which will then be executed under the high-privilege context of the IIS AppPool.
eb65f546694378db27ee102831851f498e62d4fb03e39ac60cfe0233903e6505
Pcapteller is a tool designed for simple traffic manipulation and replay. The tool allows you to recreate a recorded network traffic scenario that occurred in a foreign network, as it really happened in yours. Basically, the tool reads network packets from a PCAP file, and it replaces a given IP address with one that fits your needs. Afterwards, the manipulated packets are injected into the network. The tool is useful if you want to recreate scenarios where computer attacks or malware infections occurred. Using such scenarios as a base, Pcapteller will make it look like everything is really happening in your network. Pcapteller can help you improving your blue team's network security monitoring skills, or creating network decoys during red team operations.
9817c5848356d1c681ec4d7673067caf73002458ea45865f096169c58e3f4474
Red Hat Security Advisory 2016-0679-01 - Oracle Java SE version 6 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update upgrades Oracle Java SE 6 to version 6 Update 115. Security Fix: This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.
0340146d9888ba15286481bf065ec18c2d5a4ddf8079084b846383f0f04b7c15
Ubuntu Security Notice 2953-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.49 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Ubuntu 15.10 has been updated to MySQL 5.6.30. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
9c12ded85963841122600225020c8b57b79a49ee77bbd119512b585e2069ce08
phpLiteadmin version 1.9.6 suffers from cross site request forgery and cross site scripting vulnerabilities.
292be8d16f4261cf491c35a9bc824f7659e683907e5529a5962c98fc7707acbd
Gemtek CPE7000 WLTCS-106 suffers from authentication bypass and remote code execution vulnerabilities.
745cfcf489634daa60147be08fb47f037b6814b4b22fc0372c239b663d014cce
This python script generates bind shell shellcode for Linux x64.
da456f340343df29f1fbf4bb7a56af35e8d6ff0df790903d7442feff3a72fdd3
This bulletin summary lists MS16-039 which has undergone a major revision increment.
0ac741de4428df0121953939d51fee062a375e8acec222ddc150a90301918fe7
A signedness vulnerability exists in libgd version 2.1.1 which may result in a heap overflow when processing compressed gd2 data.
3a2ce455a8601a1585ae58c370524696afc5c9cf036efab381d9622a8c9decf1
Symantec Brightmail versions 10.6.0-7 and below save the AD password in a place where it can be retrieved.
88d3d8221a33175dc392a1dde9b17ac2dce0186a796efa0efdcc5c79c77bb457
Exponent CMS version 2.3.5 suffers from a file upload vulnerability that allows for cross site scripting.
c4ece7a07c3fa3b38dd0fb113aad54aacd042e613d452d326da6237d70179fcc
Exponent CMS version 2.3.5 suffers from multiple cross site scripting vulnerabilities.
6a585b0745893b5ede86522555e556bf41c3aa59e50576817c204b6240bf2ae1
Ubuntu Security Notice 2952-1 - It was discovered that the PHP Zip extension incorrectly handled directories when processing certain zip files. A remote attacker could possibly use this issue to create arbitrary directories. It was discovered that the PHP Soap client incorrectly validated data types. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
4d6db38bd4a4eeeff3a87c17afbc7413a7d3d1c3b63225f6e73d061b71d981c9
ImpressCMS versions 1.3.9 and below suffer from a remote SQL injection vulnerability.
61197cfbac59fcda7b4cf54107bb9e3be6d92521823d8c532388723addffcece
Red Hat Security Advisory 2016-0678-01 - Oracle Java SE version 7 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update upgrades Oracle Java SE 7 to version 7 Update 101. Security Fix: This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.
63a203916e8946bb559b14bc46107ba6a1973b9155ec04c0330c9d74b5feb030
Red Hat Security Advisory 2016-0677-01 - Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update upgrades Oracle Java SE 8 to version 8 Update 91. Security Fix: This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.
998b4e01ddd98bf99e316038c9799396bb83ab95f8c668a5bfc4e7d7fb84c82b
Red Hat Security Advisory 2016-0676-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws.
4957fba7cfab0271e2e2a1b7fecd59abf0cb0d1af97fb5c03cb515635a2e3346
Red Hat Security Advisory 2016-0675-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws.
31475770043462674735810ea8ce72f5a339a55eb8567815e81b1270ae16e78e
OpenTSDB suffers from a remote code execution vulnerability.
ef629a5afda4799864a0738de815ff969d73a1592c4e3b2c08cc18011241292a