Pydio Cells version 2.0.4 suffers from cross site scripting, file write, code execution, and various other vulnerabilities.
ec35943a76a3c284d24b95110cd826800beebfcbda0fb782c4dc64877ec72836
CipherMail Community Virtual Appliance version 4.6.2 suffers from remote command execution and file injection vulnerabilities.
8f19790f62e3ddd9f325c2b8bdab7552d76c9c096306b5c140c6286c884f3672
RoyalTS SSH Tunnel versions prior to 5 for Windows suffer from an authentication bypass vulnerability.
1a8db84c812d8d110796638e2e38f42e172e4cb2bfb9498b798176f53999e5e2
Joomla J2 Store version 3.3.11 suffers from an authenticated remote SQL injection vulnerability.
f7133c26d612c4fd8b7d2d3a1eaba6204d5cc965ec6d9dfeef4c767003ce4a54
WebUntis versions 2020.12.1 and below suffer from a persistent cross site scripting vulnerability.
44cf3405c5bd626ee5e9944a622dbbad3958f08982063107e4df146dc7fa6815
Red Hat Security Advisory 2020-2433-01 - The microcode_ctl packages provide microcode updates for Intel and AMD processors.
fd053ea7aa10e44314695f9af0ba44f8f5a6d69601c09851e20c19a40a7f6f68
Red Hat Security Advisory 2020-2427-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
1cda727d4c8d56a494ee853c03f8a048cb1eb92a87b79011f9cdd64fdd15f9a0
Red Hat Security Advisory 2020-2429-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer, privilege escalation, and use-after-free vulnerabilities.
acf6009658433ea09ea51dd431d7f820db4e2be059016b37b0080cfbaed916f4
Red Hat Security Advisory 2020-2428-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
ac276f9fcd3a3d18eca07a6e0ba7cae277d34b1165af65a5299b03855cbf079e
Red Hat Security Advisory 2020-2431-01 - Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
5116893f448e511213765a5167340441720c312e912e2eaebfe4e7ceba84cd0b
haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.
13a0d81bb395c6ebde70a6474452001d9f898d786ddf4872af9f9f96f9e99ded
Gentoo Linux Security Advisory 202006-1 - An information disclosure vulnerability in GnuTLS allow remote attackers to obtain sensitive information. Versions less than 3.6.14 are affected.
323e146f2376f2d129a54e1b0cca63f0ea73eac997d0155096a35e454fe04324
75 bytes small Linux/x86 tiny read polymorphic shellcode.
a509e58b18807ea1af8ff4869ec95f922023610871e8db9cc792dc98ccd6680c
Bandwidth Monitor version 3.9 full ROP buffer overflow exploit with SEH, DEP, and ASLR taken into consideration.
1164b8ef72c13f03af8ee99373ab4ced9527b6e1d29b01bf7dad339ae7af4667
Bludit version 3.9.12 suffers from a directory traversal vulnerability.
ddd1cd731a420cbe6faa2fe44005c2c0f117be450077aca8113fcc5f830dc1b2
Virtual Airlines Manager version 2.6.2 suffers from a remote SQL injection vulnerability.
9d81b177c7cb7929289259f1649438ac2e9df79483a7d2a4fa9c7a3beb0bee8a
Whitepaper called IOT Firmware Analysis that walks through extraction and analysis.
bfc42f441e6ad1ef2c3148bc74eba922abce549b2d648c6c677c21ea1d3549b3
Whitepaper called Exploiting Unrestricted File Upload via Plugin Uploader in WordPress.
efdbdb90e446a0fac9ede57a38883f4aa80f9e270ca7fa7750a06b3b479136af