Shopizer versions 2.16.0 and below suffer from multiple cross site scripting vulnerabilities.
f15a089b7dcf418d935f27932884b67add84f6119777557042986fb205a02eeb
iDailyDiary version 4.30 suffers from a denial of service vulnerability.
ab08487ed9c6cd04b478d62b9ad859640963033947395c4da0b42b090d3d908c
Backdoor.Win32.Upload.a malware suffers from a denial of service vulnerability.
4c6245a87e6421767c9377441a3310cc01489e66518b5d653698404989485d15
Backdoor.Win32.Spirit.12.b malware suffers from an insecure permissions vulnerability.
c81205395cc2ce19021a86b19634ef125263781a3cbcfb9b122be68801c44be8
WordPress ReDi Restaurant Reservation plugin version 21.0307 suffers from a persistent cross site scripting vulnerability.
8ad34d8c76465dc7b07f7fdbbaa7005db7b393559dc9279869c2d52fd7aff505
D-Link DWR-710 is missing server-side controls to ensure that null passwords are not set.
d4fb04ccc3705267fde078039060bb0697687df5c1b9cdeb6c7e9ff66be55e3f
ePowerSvc version 6.0.3008.0 suffers from an unquoted service path vulnerability.
32920451ca11f29b606727f1e27b11d2faa37cbfd7b4f043fde122ebd91f3dbd
DiskBoss Service version 12.2.18 suffers from an unquoted service path vulnerability.
10f6f30777a914e6f89f7dc3b803a5f2fd210d647ad35cdb6d7a86a01c3b869d
Backdoor.Win32.SkyDance.216 malware suffers from a buffer overflow vulnerability.
d12292831640bef5a90b2d0ea2b96fee2c4a006f9b7dc70edf37e7fa2b7c4661
Backdoor.Win32.Singu.a malware suffers from a buffer overflow vulnerability.
99abce8d3afa3f05677d6e4e45db4586ce71afd3995e4b35dfcedb9f506a3173
DELL dbutil_2_3.sys version 2.3 arbitrary write to local privilege escalation exploit.
1b10b851f28ebcbedb7f78ec52ac6495c3ac33581ea7f4551b9e90ac510e6512
WordPress WP Statistics plugin versions 13.0 to 13.0.7 suffer from a remote unauthenticated blind SQL injection vulnerability.
dba4efd5e93d07eb78cf38fe1ac3e56f720b56d00529815d029b973a3a8abb18
A missing length check in libX11 allows data from LookupColor requests to mess up the client-server communication protocol and inject malicious X server requests.
11761ba0cb40d006d1d9f835688853c9f235d462bc42a8503f286b6871a81294
This Metasploit module scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin by chaining this bug with another post-auth arbitrary-file-write vulnerability to get code execution. As a result, an unauthenticated attacker can execute arbitrary commands on Microsoft Exchange Server. This vulnerability affects Exchange 2013 versions below 15.00.1497.012, Exchange 2016 CU18 below 15.01.2106.013, Exchange 2016 CU19 below 15.01.2176.009, Exchange 2019 CU7 below 15.02.0721.013, and Exchange 2019 CU8 below 15.02.0792.010 . All components are vulnerable by default.
585a4badc4bc32954c170e5f8283ee5e2c9ceb31c4f0aab20e24dc5c6ff31912
Mozilla Firefox versions 88.0.1 and below suffer from an issue that allows for execution of a file holding arbitrary code just by downloading it.
2d9fb3701cd5ddb0888856065d284561d2d63a20f39e9f9c2e1486f3ef9f0974
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
3b42c5c21ad8b35302b4dac221d01252c0a94ae46bdc1c6876726f60d11b97cd
Red Hat Security Advisory 2021-2085-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability.
4f0a81e2c5d27fd9a6c3b5e1e56f67f322754ea46a1bd409211ea15627fa957d
Red Hat Security Advisory 2021-2077-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include buffer overflow, denial of service, and memory leak vulnerabilities.
705bb18b078700e9fd3519317ba6fa9569a33116767336c61e78eb943ce836ca
Red Hat Security Advisory 2021-2070-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include an information leakage vulnerability.
7578f5d5a1382ac369ceea4ea502ae58bc21dcff6d70b2118e08a915a5e53ffc
Spotweb-Develop version 1.4.9 suffers from a cross site scripting vulnerability.
edc08c2a5faaffc264b7ebd53bd4a33e8c3c676b0c81127f6aa98fce2d4127ad
GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.
6eb8e889cd5d36a2882152da0ee21316d93409184738ea0b1cc9a7320da289f4
Red Hat Security Advisory 2021-2063-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
2d94d628fff183b8bda7439b36a66bd0a88152b124667aef77772b30dd1123f6
Red Hat Security Advisory 2021-2064-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
ca330cd165ae9f65b71504ad056484a8e1c4b9cd91183154e930683371117aea
Red Hat Security Advisory 2021-2065-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
509feb989748a2a2ede4a51dc864d3c3f34475ef5553bd818835f7aec1668774
Red Hat Security Advisory 2021-2061-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability.
eb0886f0c0c16fa210f72e2ade067bf043867c0b3261d23ce696638f432b054c