ICT Protege GX/WX version 2.08 suffers from a client-side SHA1 password hash disclosure vulnerability.
f203bc1b35e3b9d44818d0680ff7a367ed1eac4fa488fe060a5c8a1fec93d479
ICT Protege GX/WX version 2.08 suffers from a persistent cross site scripting vulnerability.
0761967ed7f26d12def00046c1c81a51292379f6aee38f2875fd95654cb59e1a
OX App Suite versions 7.10.5 and below suffer from multiple cross site scripting vulnerabilities.
439326d231827e72e3d0872c060c5c62dddd34691c556c0825bfa59c8c7f1d96
In Linux, drivers/net/usb/ax88179_178a.c contains multiple out-of-bounds accesses in ax88179_rx_fixup(), the function responsible for taking a buffer received over USB and splitting it up into ethernet packets.
d31f6a101db6dc5fd85ff3bf16404acb26c0969c2cd57cc1adc10f3d4419cf21
Ubuntu Security Notice 5335-1 - It was discovered that ImageMagick incorrectly handled certain values when processing XPM image data or large images. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program. Suhwan Song discovered that ImageMagick incorrectly handled memory when processing PNG,PALM,MIFF image data. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.
d71ef36c95a343d18886a6914e5af77ad30344146938b827f9f916138328f31c
The 3CX Phone System stores password in the clear as well as makes them exportable in the administration interface.
2c1705c4372ab218a33192a0a6965c618979430b30d44e4c74099369db74b516
Poultry Farm Management System version 1.0 suffers from a remote shell upload vulnerability.
1ccdf023c5aaacf70fec2e0b540a1e46397ce4702e1e6cf831e5fc9903979c6f
Adversary3 is a tool to navigate the vast www.malvuln.com malware vulnerability dataset.
b3a55de6e0020ab30f2d793cc9afd88e324fe8b4fd73dc245afb8d7eed7cc19f
Ivanti Endpoint Manager CSA versions 4.5 and 4.6 suffer from an unauthenticated remote code execution vulnerability.
6ede7e4c555086097785e7b930d3648768ced8d291ef8685bd545f55401f4bd6
Red Hat Security Advisory 2022-0860-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.9.25. Issues addressed include a code execution vulnerability.
9e03d7da0e1a0333a90a2d45a7990487c3544cafe858c8faae9e01c6d2cee16d
Xlight FTP version 3.9.3.2 SEH buffer overflow exploit with egghunter and ROP.
8a25a3e8400b103e1968bb06bba284c8aee75861e8f8d35933431637c668ae69
Amazing CD Ripper version 1.2 suffers from a buffer overflow vulnerability.
6aea2dcb49612881d03edb658c59771baf00b1b0d1b8f85077733c4b5f4402dd
Red Hat Security Advisory 2022-0968-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7-FP5. Issues addressed include deserialization and integer overflow vulnerabilities.
a30212491ea4821b7fde0bcaf4a2db6f6f9a910c995fa137ace8429ca59bce8c
Home Owners Collection Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for remote code execution.
33d94e2ce6a5ef29774f363c1fcdc202217913a434a7dd410cf6aa45bb79454c
Red Hat Security Advisory 2022-0927-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.5.
a0d76368062abcbab0539a589880d0597447336eb01ae69a1c42ba383dccd5f2
The 3CX Client for Windows (legacy), Android, and iOS fails to properly validate TLS certificates.
074017ebf0abca4d37a8b67b240f167c0bec4bbfda44f67fe65cc2c9c71455a1
Red Hat Security Advisory 2022-0969-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR5-FP5. Issues addressed include deserialization and integer overflow vulnerabilities.
884c9441bde958f07d32536259e6bf0dbacffd55c6cd665bf1c4686c67cbedaa
Inventory Management System version 1.0 suffers from a remote SQL injection vulnerability that can be leveraged to gain remote code execution.
7cc6ee4181b5d5e52b0cc23898c1315185ae2b4a6cc52d71a24a83564cddffa4
Inventory Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
d8fd3b61af8814c5fe9d16c0f05edbe981b0fa8bac9d1cdbe15895f9bdf06941
Red Hat Security Advisory 2022-0971-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a privilege escalation vulnerability.
e0172eabb0bff4bd40800e07cc360c2ad20abbdbb8f21b9a802a577f6ff8bf97
Red Hat Security Advisory 2022-0973-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include a privilege escalation vulnerability.
67e782c7e79ed0b94a3980575dbe5a80344c76be79c06747974950a2c882747d
WordPress iQ Block Country plugin version 1.2.13 suffers from an arbitrary file deletion vulnerability.
f0010d1dc3064386061b5ec573e0ad6624d9a232d481f124beeca9af833a6844
SAP Knowledge Warehouse versions 7.30, 7.31, 7.40, and 7.50 suffer from a cross site scripting vulnerability.
3cdb75beff9ad13b8fd31c0196339aaa4bd2eba05bc62d3ddf8e67c54c8cf3a8
Red Hat Security Advisory 2022-0970-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7-FP5. Issues addressed include deserialization and integer overflow vulnerabilities.
14ad386d2ad8d88c80409f5d366b55521907fbd246e1e98fd96686120632fa70