UCOPIA Wireless Appliance version prior to 5.1.8 suffer from a restricted shell escape vulnerability.
b89bf2b19931af9f45509a36fd07550ef582566bfe0c8c59bec4e7227f00f09b
SolarWinds Network Performance Monitor version 12.0.15300.90 suffers from a denial of service vulnerability.
93180898a3ba0ab2702b4aa9e84bd5c58147e51d7d510916d0269bf60b73ba35
SolarWinds Network Performance Monitor version 12.0.15300.90 suffers from a cross site scripting vulnerability.
8a663aeaed4fe6990426272c59d2c99b583958e2f530562ff27f3da2bfe17d28
The Zyxel P-2812HNU-F1 DSL router suffers from a remote command injection vulnerability. Firmware versions V3.11TUE3 (KPN) and V3.11TUE8 (KPN) are affected.
66372d846f543901562ef728ccfb30a15e208e8dff6f028467937af652912375
Red Hat Security Advisory 2017-2832-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix: A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application.
f6d25e475ba88f963fde6ff80256abf19259f2246d2704c39da7cb1f4cbe6ece
Red Hat Security Advisory 2017-2831-01 - Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.4.0 ESR. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox.
f890e6d4a2503e3c55f1573641340308744535c5bcaee7b7230a65dd9586e88c
Red Hat Security Advisory 2017-2818-01 - In accordance with the Red Hat Virtualization 3.x Support Life Cycle Policy, support will end on September 30, 2017. Red Hat will not provide extended support for the Red Hat Virtualization Manager and Red Hat Virtualization Host. Customers are requested to migrate to the newer Red Hat Virtualization product prior to the end of the life cycle for Red Hat Virtualization 3.x. After September 30, 2017, technical support through Red Hatas Global Support Services will no longer be provided, other than assisting in upgrades. We encourage customers to plan their migration from Red Hat Virtualization 3.x to the latest version of Red Hat Virtualization. Please contact your Red Hat account representative if you have questions and/or concerns on this matter.
c8ac9668781707c88654fb8b7ba988adc3f1702f87b57c04ccfad1dec5d0d034
HPE Security Bulletin HPESBGN03773 2 - A potential security vulnerability has been identified in Application Performance Management (BSM) Platform. The vulnerability could be remotely exploited to allow code execution. Revision 2 of this advisory.
b9537e8d57a0d231e698e3b91604a181835b850d18eb806d57883a364fa1ef95
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a host header injection vulnerability.
ca851dfdc30f3ca29be4beb58fda82f5431c4b58b939a638be47b4f47458dc25
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a server-side request forgery vulnerability.
b78a20a2c968c75631e6990a1f7e972c823b375e7d86ef59f2be61b0a46109c1
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from NT domain and PHP information disclosure vulnerabilities.
cbc24777efe60d495308e8e83b6aab3977c7f4ca4be577179c3bb0fd8a7ebf53
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from Start Remote Process code execution and denial of service vulnerabilities.
6de08e124c8b1a0239b20e4fa1c2cbdf3e13a51ade31822cc0daeada5571141c
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a curl man-in-the-middle remote code execution vulnerability.
a951ff568b5eb974a3fcb41787cccb1e6f0712ff17d8f8b55fbbe1162c616bf1
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from an XG image file execution bypass vulnerability.
39feeb31db761809500aabac33bb9d824e3646b7a52d3c8c0735f44deefaf200
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a pre-authentication encryption key disclosure vulnerability.
0300820dbf3c570f226bdcebb695752c98f73528c93322e27eaac142ce6d9feb
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the Deployment functionality.
73990b4f2d4900515078c4e3e54e6c2a672d4e451a27fcc91b4b3b158d608144
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the XPressoDoc functionality.
835e7040485b8eec8fd758b43e023864584ee9ddd8bf28a69d28672cb49a540d
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the xDashboard functionality.
b7a7c0af738724338221fcb3437fbd9c6305623423be669615e20e312ec2377f
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the doclist functionality.
06fe4a5631c9ee9c179de3b45c389621f11062c74876783f3fd5a7b523eb4ec9
OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from an arbitrary file read vulnerability.
81085a870f935b25853be4a14962995c5ed2c54f8ad9e7006dad0bd9a8bd405a
Faleemi FSC-880 suffers from command execution, cross site request forgery, remote SQL injection, and various other vulnerabilities.
96810e1c0eb0fbaef786214d894173d6a716f9e0dc87838dcea25c2904912f95
SAP Enterprise Portal versions 7.50 and below suffer from a cross site scripting vulnerability.
4503b81eaafa421596f9ee7c02f6584b28692f5ce5d6d382856e0da15b47ab1b
This exploit tests the target Oracle WebLogic Server for Java Deserialization remote code execution vulnerability. The ysoserial payload causes the target to send Ping requests to the attacking machine. You can monitor ICMP ECHO requests on your attacking machine using TCPDump to know if the exploit was successful. Feel free to modify the payload (chunk2) with that of your choice. Do not worry about modifying the payload length each time you change the payload as this script will do it for you on the fly. Versions affected include 10.3.6.0, 12.1.2.0, 12.1.3.0 and 12.2.1.0.
ac556f1550022f3147ba71eb384d81217f8f01394258077e4047ca66a5f06464
Roteador Wireless Intelbras WRN150 suffers from an authentication bypass vulnerability.
d7fa7ee4b3e55bcdd38622b982fbf3eb8af71e001cee414eaa3b330410fb36ba
ZeeBuddy version 2x suffers from a remote SQL injection vulnerability.
a7c1ced652dcd3ddf53bb716966fe71c5928d74d2a85e0442128dde52c967342