Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
6b8b183a8409829ca92c71854cc1abed45f04ccfb7f14c08211f4edf571fa577
TYPO3 Formhandler version 2.4.0 suffers from a cross site scripting vulnerability.
1d3622f0e4f3d15078215547598f31908bda1104d6de15ccb96b0669109dc293
Ubuntu Security Notice 3370-1 - Robert Swiecki discovered that the Apache HTTP Server mod_auth_digest module incorrectly cleared values when processing certain requests. A remote attacker could use this issue to cause the server to crash, resulting in a denial or service, or possibly obtain sensitive information.
fb59dcbe81a38b0e84bd2e67c67c2b400326de92855c04f7a023ea36285e6393
Ubuntu Security Notice 3369-1 - Guido Vranken discovered that FreeRADIUS incorrectly handled memory when decoding packets. A remote attacker could use this issue to cause FreeRADIUS to crash or hang, resulting in a denial of service, or possibly execute arbitrary code.
2d7269bf484f6ead1a2687767dc01354af1b32f08cd2d4f72d0baaf9e1c1f6c3
This Microsoft bulletin summary lists multiple CVEs that have undergone a major revision increment.
216654f42ece44e0dad05adb1548052ac516718f4140fed8bea0feb41abc2e7d
Ubiquiti Networks UniFi Cloud Key with firmware versions 0.5.9 and 0.6.0 suffer from weak crypto, privilege escalation, and command injection vulnerabilities.
ff7df61d3c20ef698eeacd98caa047a8dc5114df5d8ba8103bd56c8c1fd454e9
KATHREIN UFSconnect 916 and 906 with firmware version 2.23 build 224 suffer from denial of service and unauthenticated access vulnerabilities.
d34e42d46978401f5571e9b56b01a873a736e3891811d9f953a96ac17a8a227b
Friends in War Make or Break version 1.7 suffers from a remote SQL injection vulnerability.
3e428a06a729d50e22f570bba3e4442fe85fee20da24dfbfaf5e621126710aed
Friends in War Make or Break version 1.7 suffers from an unauthenticated administrative password change vulnerability.
234bbef0b5e39ebc0a6238178a400f1a4461860312f92fef37656fc31f8b5bee
FreeIPA version 2.213 suffers from a session hijacking vulnerability.
3456feb0f0f4e99f51ee106a7c3a9173087d7fd408994cc6022e34492d7c8be9
GNU libiberty suffers from a buffer overflow vulnerability.
f488f4c8d718626de03b04b0bf3b6e0d6ab921be84730c63edda9b52a4fa8296
Friends in War Make or Break version 1.7 suffers from a remote SQL injection vulnerability that allows for login bypass.
947786fb40025bbf1b4689f204b4c9d2994da84e69edc479629136ec1a705f2d
Red Hat Security Advisory 2017-1809-01 - Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. Security Fix: A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. A vulnerability was discovered in Tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application.
8bf0dc615683dd9ae21de05c218282d759e0e15d7ddc2f5c8b59f7b6184aed68
Joomla CCNewsLetter component version 2.1.9 suffers from a remote SQL injection vulnerability.
124d7a033bba060fa99da10c2eca4809543319e237e3f644453981891b943941
MEDHOST Document Management System contains hard-coded credentials used for customer database and Apache Solr access.
85a0b069bd2522941bc398c17e5e9d33b41ced7ad37d1eba52db6905451be0d8
AudioCoder version 0.8.46 suffers from a local buffer overflow vulnerability.
4ad07950b4dfd545873d33a377ecd6804695d4a9a310326efa94a16b1b05e8c3
97 bytes small Linux/x86 reverse tcp shell shellcode with no NULLs.
6801867647c5ecbb5ecf15fe7b1a8a49fcccea11b3d22d816db0d2b742be766c
MediaCoder version 0.8.48.5888 suffers from a local buffer overflow vulnerability.
33a3d7b54c7074fa0f638b43e2f08e3031bd106121c0db814735d452f42cdf7b