DrayTek Vigor ACS server, a remote enterprise management system for DrayTek routers, uses a vulnerable version of the Adobe / Apache Flex Java library that has a deserialisation vulnerability. This can be exploited by an unauthenticated attacker to achieve remote code execution as root / SYSTEM on all versions until 2.2.2. Exploit code included.
60c785cb65ea73995e98356a426bb3d66989648127e57b852b5e6e7136b2cfa1
Microsoft Internet Explorer version 11.371.16299.0 suffers from a denial of service vulnerability.
aa89751f41c7ac981bc2efac8958af3bcef9d8eab8371f01149940d332da7df8
Foxit Reader versions 8.3.1.21155 and below suffer from a dll hijacking vulnerability.
797ce91a1511fd1586e630420c29727ea9d363fe51d4d193f5fb8de650bd4beb
73 bytes small Linux x86 reverse TCP shellcode that binds to 127.1.1.1:5555.
dce3a9bdd6f833789f3cb1ebdc4c319f643e194ccaf05a7f1a74c33473791795
Cobub Razor version 0.8.0 suffers from a path disclosure vulnerability.
b6f93be6803ee1026af40c31c1c44445f8b8868e618dcd86f542161b832b5d8a
Red Hat Security Advisory 2018-1191-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a bypass vulnerability.
025e0cde2194670d686b880f3a9df16fc361bc15e48a96bca36432c1b9e36190
Red Hat Security Advisory 2018-1188-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a bypass vulnerability.
87ae60024967af1a3267d9309cb4cf6625b7d944c43b3532d2896668bae46549