Joomla J2Store versions prior to 3.3.7 suffer from a remote SQL injection vulnerability.
1e97794d4336f176dd444cd3487fac8800756e95c4fa44ecb5dbc4a997e2daa4
A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow a local attacker to elevate privileges. Cisco Webex Meetings Desktop App versions 33.6.4.15, 33.6.5.2, 33.7.0.694, 33.7.1.15, 33.7.2.24, 33.7.3.7, 33.8.0.779, 33.8.1.13, and 33.8.2.7 are affected.
9d1274a1cd79b05c5388dac3dae49ae0bd47e790ca5b08b896914d7cc2998ca8
Asterisk Project Security Advisory - When Asterisk makes an outgoing call, a very specific SDP protocol violation by the remote party can cause Asterisk to crash.
cfd552c580ab39cd59a7ced3f4275e11227e78524785c98e12870dd229702f7a
Ubuntu Security Notice 3900-1 - It was discovered that GD incorrectly handled memory when processing certain images. A remote attacker could use this issue with a specially crafted image file to cause GD to crash, resulting in a denial of service, or possibly execute arbitrary code.
46470680db6dfc7a7bf912eb15368330de552c69127de9ce9ce73617c85925f1
Red Hat Security Advisory 2019-0436-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a memory disclosure vulnerability.
3d13b627f0f2833454eaf6f13086748c3c9a3877f4f94f04f8d99ecfe0210f5f
Red Hat Security Advisory 2019-0435-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a memory disclosure vulnerability.
3d6158b003a3ef9b9c2b26b7622e9caa36763a0711f35e910235066370e3f0ab
Red Hat Security Advisory 2019-0431-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a traversal vulnerability.
8f36e85cc59e193fe75cdbbe302b121b8a7d63456b829ae5ccbbc18d0bd92760
Red Hat Security Advisory 2019-0430-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a traversal vulnerability.
115db480d8acd284058dbc2b9f8f19d72753b76ee95bb06cf2139b85a0d858a1
Red Hat Security Advisory 2019-0432-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a traversal vulnerability.
25d262d0929ed26f3c9a8d083b219a9f9378a368566644c5f0b2ada87269adf7
Red Hat Security Advisory 2019-0433-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a traversal vulnerability.
f7e671e88c0039e80d7e4df094f3c1a998198cecc67f85642280355229761570
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
bc4f30f5b2e94f3a696fef9de44673cdf402db90aac5299966da647f708f009e
Joomla Content component version 3.x suffers from a remote SQL injection vulnerability.
9ba6843822eb295a8cb3e2cf6821ce870f61f2cee34eb1132a8cc436ea24c19f
Debian Linux Security Advisory 4395-2 - A regression was introduced in the previous chromium security update. The browser would always crash when launched in headless mode. This update fixes this problem.
89f054e653264588cb6a20adbe30c78ecdea038c752f2d8723fb77bbc234fc59
Whitepaper called Android Security Research: Crypto Wallet Local Storage Attack.
d4ec44d04cda2c87a67db49c174fec961eb574fcddcdec97e38b0cdd8f2c2a23
FTP Server version 1.32 suffers from a denial of service vulnerability.
300bae6c8767ddf928747116088b6a4834029d98aa60ccacc139e083987e83ce
This Metasploit module exploits an arbitrary file upload vulnerability in Feng Office version 3.7.0.5. The application allows unauthenticated users to upload arbitrary files. There is no control of any session. All files are sent under /tmp directory. The .htaccess file under the /tmp directory prevents files with the php, php2, and php3 extensions. This exploit creates the php payload and moves the payload to the main directory via shtml. After moving the php payload to the main directory, the exploit executes payload and receives a shell.
a940da2e6fa296310cce651b821c9fdf8c7a9ec1bb8147e392837045d45532aa
WordPress Cerber Security, Antispam, and Malware Scan plugin version 8.0 suffers from multiple bypass vulnerabilities.
4a5265fe88f590f2244214ce3ceaa7a2cff1c4aa959fe7a44a983ec7873765df
vBulletin version 4.2.5 with vBSEO version 3.6.1 suffers from an open redirection vulnerability.
3e6072c777f9e6b1fa54d538e3787db1c5549291bfde83d4d7294b5f5158b225
vBulletin version 4.x.x with DragonByte SEO version 2.0.31 suffers from an open redirection vulnerability.
c30a29020b2699d4b2fca2b1786f0511f9e9546a4d8d9a6313fa1002191ef024
This Metasploit module exploits an arbitrary command execution vulnerability in Usermin 1.750 and lower versions. This vulnerability has the same characteristics as the Webmin 1.900 RCE.
505ea2f8624f6e3310d6adcbed739f255d5848596538d08bca4e2634ea2ba8d5
TransMac version 12.3 suffers from a denial of service vulnerability.
412064fa5edcf00ced6b78b017347a3b832744568aeba5f1c58e79b27548ef80
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
747b3e7a37414942959f76f198be49dcbcca936bda538c4408942ce71bfd2b71
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
5c557b023230413dfb0756f3137a13e6d726838ccd1430888ad15bfb2b43ea4b
Red Hat Security Advisory 2019-0416-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a memory disclosure vulnerability.
8f3bac9eaeba235ec1f3f98932b1e31388533eb546af550ac0b44834cb5726ae