Dell SonicWALL Secure Mobile Access SMA version 8.1 suffers from cross site request forgery and cross site scripting vulnerabilities.
9c6e1e62011dc14636b4f5849d5f84a87d42f3acec586620f4296ac473fb6a89
Dell SonicWALL Network Security Appliance NSA 6600 suffers from a reflective cross site scripting vulnerability. Versions affected include NSA 6600 running SonicOS Enhanced 6.2.4.3-31n, WXA 4000 running 1.3.2.0-07, and SafeMode 6.1.0.11.
7acfa2c554a74790d4f42eb76bd861d05da2b1676d2dbb778bd9718473d384d5
Dell SonicWALL GMS versions 8.1 and below are compiled with a vulnerable version of Adobe Flex SDK allowing for same-origin request forgery and cross-site content hijacking.
8f794ee7fc9e35a42edc8e64fbf6ee9b23bb21bc417c3048b02542052351a465
Dell SonicWALL Global Management System GMS version 8.1 suffers from multiple cross site scripting vulnerabilities.
4ff507814e6b70172b5af043ac9e0187e3cde0d9d9dc599e3faaaaadbb3a2be8
Dell SonicWALL Global Management System GMS version 8.1 suffers from multiple blind SQL Injection vulnerabilities.
ed39afdb0140eefc12c029710bd973c6e28062ce928ce54e618a3047f92fce43
Gentoo Linux Security Advisory 201612-49 - A vulnerability in mod_wsgi could lead to privilege escalation. Versions less than 4.3.0 are affected.
ca41096d460fe443d6a3451c919e32eb523a3ee9eebf78037712cd61bf3da4d4
Red Hat Security Advisory 2016-2999-01 - In accordance with the Red Hat OpenShift Enterprise Support Life Cycle Policy, support for OpenShift Enterprise 2.x will end on December 31, 2016. Red Hat will not provide extended support for this product. Customers are requested to migrate to a supported Red Hat OpenShift Enterprise product prior to the end of the life cycle for OpenShift Enterprise 2.x.
3bd9d82cc8f62b4b6059ee2669cbdac6b398a337acfea1198811f8bd3f7fadf6
The executable installers for SoftMaker FreeOffice 2016 suffer from a dll hijacking vulnerability.
39d6f374e7f5ddfb9ee1f781e5f859bda17f2c5deadec395f98ca0fec1c23cb7
WordPress Templatic plugin versions 2.3.6 and below suffer from a remote file upload vulnerability.
fff3adededad0edcf403d8a8ae2510616b9205fa30fb3b7430db7969991f8258
This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.
982523e4d3ea03d3e507bd1c733dc795411c04b6c39b21e3be32e22dc1029863