Jettweb Hazir Rent A Car Scripti version 4 suffers from a remote SQL injection vulnerability.
adc7b5fa2b9c4760ac4c93a250486dd1bd25e9c5a72bd91235f2818e66c9f4b2
Firefox versions prior to 66.0.1 suffer from an Array.prototype.slice buffer overflow vulnerability.
851f7c03bad5c91e3b04bd52dc421d3831d299b9eb32ac1821c4fb8780f1404e
XooDigital suffers from a remote SQL injection vulnerability.
64062bede02f5a9cf8b1d9312ef26ef1a3ddcde17f7df1d21b6ae4b239ab36de
XooGallery suffers from multiple remote SQL injection vulnerabilities.
a0f2806fd8b2ff66dc6b0fc8e2eafb471291f0a842fa1aa2028272af8679ceaf
Rukovoditel ERP and CRM version 2.4.1 suffers from a cross site scripting vulnerability.
12f62dc9fcfbd0ced37ff58e790b178d0c1a515acb1d918c4ae0168f2cc9a699
Jettweb Php Hazir ilan Sitesi Scripti version 2 suffers from a remote SQL injection vulnerability.
9095c78790c060129f55e6d705ff1c7525761f246f0f58ee5150a8448fa926ff
SJS Simple Job Script suffers from cross site scripting and remote SQL injection vulnerabilities.
a81502b4b25ab5fa593f97d8d3881ed98e9cc4a421140caaedf7ee41eb599c3e
WordPress WP-Forum plugin version 1.7.8 suffers from a database disclosure vulnerability.
85ccea7cd4179794c832f4544bfc8ab29e98107c224207638a672ff1ed604f78
Microsoft Windows Win32k local privilege escalation proof of concept exploit.
6774a9c3a588e5f20f4f14249b0356b8a13d70a8848eed507eb39dba135af5d3
WordPress AND-AntiBounce plugin version 1.0.3 suffers from an open redirection vulnerability.
67a2fa1deeacf0192b0e55d8b263b84d8a4a0f4dbef2c422272651b76f200c25
EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the Networker Client execution service (nsrexecd) when oldauth authentication method is used. An unauthenticated remote attacker could send arbitrary commands via RPC service to be executed on the host system with the privileges of the nsrexecd service, which runs with administrative privileges. Affected includes EMC NetWorker versions 8.2.x, versions 9.0.x, versions prior to 9.1.1.5, and versions prior to 9.2.1.
66870bbfcda2e853c60f884ceb3c02b01afe04b67bf39ddb8d2eae51ae0edfb0
Titan FTP Server 2019 build 3505 suffers from a directory traversal vulnerability.
8e3e98d88206deab4585f5cf3c2e19aaef14d402496a5f04fa0479e7b564ef81
Ubuntu Security Notice 3922-1 - It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information.
4230ef3aca29729c8aac913aee4501ad0a88f0df9c3b31f74638ddd84cd3e99b
Ubuntu Security Notice 3921-1 - It was discovered that XMLTooling incorrectly handled certain XML files with invalid data. An attacker could use this issue to cause XMLTooling to crash, resulting in a denial of service.
9dd55485dbcf24f8b23648a7647ef2ac58ab5bccd2f0f3e70f2362979069d267
Red Hat Security Advisory 2019-0651-01 - Ansible Tower version 3.4.3 has security updates that Red Hat did not feel like explaining in this advisory.
f3a989fc6b07f1220ca069b313f166cd30aa34a90781112c73dfa0b9d5f7739d
Red Hat Security Advisory 2019-0652-01 - Ansible Tower version 3.3.5 has security updates that Red Hat did not feel like explaining in this advisory.
2638cb5d98f9dd47e1a7385986d6b92adb44d0f3f85b6e4bc38cb0d57d8dd34c
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
cb8ce298d7b36558ffc48aec961b14c830ff1783eef7a623411188b5e0f5d454
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It will be held June 28th through the 30th, 2019, in Montreal, Canada.
943c9ea8eeaf47093b77924d15201f65cc7a6b61b960969450ba9bf1f71586e2
RedTeam Pentesting discovered that the shell function "getopt_simple", as presented in the "Advanced Bash-Scripting Guide", allows execution of attacker-controlled commands.
774ed521003d36a5ec3bd1c92f36d2980cef1f0a9edd2618ea47b78c70be3822
WordPress article2pdf plugin versions 0.24 and above suffer from resource exhaustion, arbitrary file download, and file deletion vulnerabilities.
3689fbc7c8dc5daf8f3dd299ece2b32708a35eca919eca7ca9ca602463c09044
DASAN H660RM allows for unauthenticated ping access, has a hardcoded key for encryption, and logs sensitive information into /tmp.
de1439ba49e2762cb6f57ff0e775a7b05e70db3ea5a1aa4a0759ccc8915120d4
Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.2 and -current to fix security issues.
9ca6c4689813e92c2671812ab98c546297583edea20c3035e29bc3d8ad309811
Apple Security Advisory 2019-3-25-6 - iCloud for Windows 7.11 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.
50944b66f84f48ee71152d55defb8e798209586aad1b47dc0919a4360b743848
Apple Security Advisory 2019-3-25-1 - iOS 12.2 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.
8b2388d689595cfb149767e2dd6554582de27ca957a31fbaf165e95d77afc380
Apple Security Advisory 2019-3-25-5 - iTunes 12.9.4 for Windows is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.
74996f9602b2d564b466d0b3f892745006b1fc528acf0fb68256a697ff0e41b3