Dell SonicWALL Secure Mobile Access SMA version 8.1 suffers from cross site request forgery and cross site scripting vulnerabilities.
9c6e1e62011dc14636b4f5849d5f84a87d42f3acec586620f4296ac473fb6a89
Dell SonicWALL Network Security Appliance NSA 6600 suffers from a reflective cross site scripting vulnerability. Versions affected include NSA 6600 running SonicOS Enhanced 6.2.4.3-31n, WXA 4000 running 1.3.2.0-07, and SafeMode 6.1.0.11.
7acfa2c554a74790d4f42eb76bd861d05da2b1676d2dbb778bd9718473d384d5
Dell SonicWALL GMS versions 8.1 and below are compiled with a vulnerable version of Adobe Flex SDK allowing for same-origin request forgery and cross-site content hijacking.
8f794ee7fc9e35a42edc8e64fbf6ee9b23bb21bc417c3048b02542052351a465
Dell SonicWALL Global Management System GMS version 8.1 suffers from multiple cross site scripting vulnerabilities.
4ff507814e6b70172b5af043ac9e0187e3cde0d9d9dc599e3faaaaadbb3a2be8
Dell SonicWALL Global Management System GMS version 8.1 suffers from multiple blind SQL Injection vulnerabilities.
ed39afdb0140eefc12c029710bd973c6e28062ce928ce54e618a3047f92fce43
Gentoo Linux Security Advisory 201612-49 - A vulnerability in mod_wsgi could lead to privilege escalation. Versions less than 4.3.0 are affected.
ca41096d460fe443d6a3451c919e32eb523a3ee9eebf78037712cd61bf3da4d4
Red Hat Security Advisory 2016-2999-01 - In accordance with the Red Hat OpenShift Enterprise Support Life Cycle Policy, support for OpenShift Enterprise 2.x will end on December 31, 2016. Red Hat will not provide extended support for this product. Customers are requested to migrate to a supported Red Hat OpenShift Enterprise product prior to the end of the life cycle for OpenShift Enterprise 2.x.
3bd9d82cc8f62b4b6059ee2669cbdac6b398a337acfea1198811f8bd3f7fadf6
The executable installers for SoftMaker FreeOffice 2016 suffer from a dll hijacking vulnerability.
39d6f374e7f5ddfb9ee1f781e5f859bda17f2c5deadec395f98ca0fec1c23cb7
WordPress Templatic plugin versions 2.3.6 and below suffer from a remote file upload vulnerability.
fff3adededad0edcf403d8a8ae2510616b9205fa30fb3b7430db7969991f8258
This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.
982523e4d3ea03d3e507bd1c733dc795411c04b6c39b21e3be32e22dc1029863
BetterCAP is a powerful, flexible, and portable tool created to perform various types of MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more.
3d3a14ee4fba97035034727f21e21de345c72cdcaf102f2678fe07019f684110
SwiftMailer versions prior to 5.4.5-DEV suffers from a remote code execution vulnerability.
6c8d495f3e13599fefac246580f75812ee61962841c2cff7e333f604d3caee57
Joomla aWeb Cart Watching System for Virtuemart component version 2.6.0 suffers from a remote SQL injection vulnerability.
7e01460777d0c5fa47b60fb42392b753f3aa3c93727eef86010d979434caf030
Android suffers from a heap overflow vulnerability in the tlc_server via the LOAD_TUI_RESOURCE command.
86e702bdd1d488d4d30b48a6d40d70980efaf82cea8187080028d215fe150b1f
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
972db3aa0cca5a41e4432bc9c3475cedbf89ac641971474928f4bfb8940ed4bc
PHPMailer versions prior to 5.2.18 remote code execution exploit. Written in python.
0c56ae7013e3bf2befd1a423d12185599a480137baf9d7604084810574ff6517
WordPress Simply Poll plugin version 1.4.1 suffers from a remote SQL injection vulnerability.
ef47966e67d7cfe37bcac64037fb9770922a3340d0c34e06bc26a88367e9820b
The Apache Qpid Broker for Java can be configured to use different so called AuthenticationProviders to handle user authentication. Among the choices are the SCRAM-SHA-1 and SCRAM-SHA-256 AuthenticationProvider types. It was discovered that these AuthenticationProviders prematurely terminate the SCRAM SASL negotiation if the provided user name does not exist thus allowing remote attacker to determine the existence of user accounts. Versions affected include 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, and 6.1.0.
bbddbf23e1945b53856cc72ded8b1e2e1d8c44d3cf6502cc4774ffa2d0a1ea0d
PHPMailer versions prior to 5.2.20 zero day remote code execution exploit. This bypasses the CVE-2016-10033 patch.
773582183b0cfc6f38ae24f52f7dfb831cd2f3410287245bc6daea84d4d8db83
Popcorn Time version 5.6 suffers from a dll hijacking vulnerability.
883530884f216f6c68ef7fc7eb9ed28a2843523eb359a4b11af300a6969b344a
WordPress Image Slider plugin versions 1.1.41 and 1.1.89 suffer from an arbitrary file deletion vulnerability.
d26c0835b8209ca0f2b538837df8ceca4fa3b26c17c033bd4da15d6d4bce5a72
PHPMailer versions prior to 5.2.18 suffer from a remote code execution vulnerability. This archive consists of the full advisory and also the proof of concept code.
dff0fa27b99b22d59b30f33bda4811c6f57a5db1cf1cab549e564bd62faa8e9c
Gentoo Linux Security Advisory 201612-48 - Multiple vulnerabilities have been discovered in Firejail, the worst of which may allow bypassing of sandbox protection. Versions less than 0.9.44.2 are affected.
c2e979eb3bc4ad52d25870c0826ed70cd68f17895354266918e0594a0f5706c0
PHPMailer version 5.2.17 suffers from a remote code execution vulnerability.
71254449b5468229de9f3d24cd3659f8ff035410115b6cf7f950f99bf518712f
Wampserver version 3.0.6 suffers from an insecure file permissions privilege escalation vulnerability.
c7e89a27153abc7ebb3140264dc5c61b0e999733bfa04f0a88ce1e56a56b9a1d