Modern POS version 1.3 suffers from an arbitrary file download vulnerability.
879c17c476a01b7028a7357d89d82dc1c869de1e3c6385be0b4a09c779b77b89
Twilio WEB To Fax Machine System Application version 1.0 suffers from a remote SQL injection vulnerability.
d3665493ac40b4c86040f6d33df0eb8bcc85f711a5910f130387e71cce9756d9
xorg-x11-server versions prior to 1.20.3 Solaris 11 inittab local privilege escalation exploit.
f395fa6075c97d0f6a5281e7569a3262f4c8a507bf9f6ed087f0ecc2779560ef
Red Hat Security Advisory 2019-0049-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include an out-of-bounds heap write and stack overflows.
192c49fe3acc8444a71a8d0209cd1bf76aca4a4c7da8f91752ffbfe5a807a352
Slackware Security Advisory - New zsh packages are available for Slackware 14.0, 14.1, and 14.2 to fix security issues.
75714a129e42d4b4915bf3a86c269a8547eaafbdae3c85324b24890e055279b1
Debian Linux Security Advisory 4367-1 - The Qualys Research Labs discovered multiple vulnerabilities in systemd-journald. Two memory corruption flaws, via attacker-controlled alloca()s (CVE-2018-16864, CVE-2018-16865) and an out-of-bounds read flaw leading to an information leak (CVE-2018-16866), could allow an attacker to cause a denial of service or the execution of arbitrary code.
f1905ee4f2f177d9148c8dde2b87c29cde068f90652dff3c397a9679c408cf42
Debian Linux Security Advisory 4366-1 - An integer underflow was discovered in the CAF demuxer of the VLC media player.
9b42ce85dee113e384a4f72db80602919d10d2e2a92299845584d92550f98182
Slackware Security Advisory - New irssi packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
a2ca20fc843a5e9cc05350fb481d534b5d782674c13ff1d438a0d76705426fae
Horde Imp suffers from a remote command execution vulnerability.
3f8cad1a53838f0bcdb404cbe6af33599b8dac2cb20f4252118cbfce956892d8
Lenovo R2105 suffers from a cross site request forgery vulnerability that can allow for remote command execution.
3a3e271e80ce64eb9ef1a933719e14fee57c010f368595809e92ec3d09c302f4
Bigcart Ecommerce Multivendor System version 1.0 suffers from a remote SQL injection vulnerability.
8e58f33a8897f55c2e93eb715dd39571f4ba02b1f1667fdc0711cf2e68459486
Umbraco CMS version 7.12.4 suffers from an authenticated remote code execution vulnerability.
7ba02d67572e6a1dec0282ee1b27ebba6f0f563a1f7370d383c0d4e312094e95
Dokany version 1.2.0.1000 suffers from buffer overflow and privilege escalation vulnerabilities.
4cec54150e83733ee365b015529c4d432dc43bb01ce8a5e7c39183d5d8c98f09
i-doit CMDB version 1.12 suffers from an arbitrary file download vulnerability.
8d08c910be1216e91d4cc12c962240d71ffd6284b888e52ae6f7e9578d6bfe55
ThinkPHP version 5.x suffers from a remote command execution vulnerability.
a3a0d90dd580a9cdc42b8b449a00f5a6a5823b29948d0c84e8619865d6cf8ad4
Whitepaper called Windows Privilege Escalation.
10db37c396add01464021e2f2a09c672ffb62d7ce83d2fff079b70964abf8c91
Across DR-810 ROM-0 suffers from a backup file disclosure vulnerability.
5c5ee452a50e85e3abb99a7269a07bab5fbf751fc6ed8798968e8125b0d6d468
Whitepaper called Reverse Engineering 101 use Radare2.
20068719acf570df5c5cdc83ba263e42ea986d454991daa66246543af564c10d