Atlassian SourceTree Client version 2.5c and prior contain a client URL handler command injection vulnerability that allows attackers to execute specially crafted sourcetree:// commands with arbitrary arguments on multiple platforms.
76ccd1c3da69210c907e6ae1b6d727a681548009bf247047b3899781e363f05a
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
557ab284f877aa6c8a26f7491c0373a84836593e5e0ca141b327035e7937dd6d
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
af05f5e2474da29d5ad0921a67e422a9c4d6eddef40e64d8b218a309477de416
Serviio PRO DLNA Media Streaming Server version 1.8.0.0 PRO, 1.7.1, 1.7.0, and 1.6.1 suffers from a REST API arbitrary code execution vulnerability.
e41a227a5bca0a2bcf71239bb0ef14ed916b46994748325354e981fe8a14b8ed
Serviio PRO DLNA Media Streaming Server versions 1.8.0.0 PRO, 1.7.1, 1.7.0, and 1.6.1 suffer from a REST API arbitrary password change vulnerability.
ba3cd469ecbb2e7b3b27a9417cf66ad86c18ce5cd80e0f8e632a0033c531ea96
Debian Linux Security Advisory 3843-1 - Two vulnerabilities were discovered in tomcat8, a servlet and JSP engine.
36b73d37d4ac232d779acc48057f8c4763d48863342cb9d845dc45730f641a70
Debian Linux Security Advisory 3842-1 - Two vulnerabilities were discovered in tomcat7, a servlet and JSP engine.
84181250c09b447af8290f314336cc965b96a6bfa3a093531e511eccf9932c3b
HPE Security Bulletin HPESBHF03741 1 - Potential security vulnerabilities with OpenSSL have been addressed for HPE Network products including Comware 7, IMC, and VCX. The vulnerabilities could be remotely exploited resulting in Denial of Service (DoS) or disclosure of sensitive information, or locally exploited resulting in unauthorized disclosure of information. Revision 1 of this advisory.
273a8e07f2cfd72d286f3067512289a13cef04a30487bc2abfabe81687e89a5e