The Oracle WebLogic WLS WSAT component is vulnerable to an XML deserialization remote code execution vulnerability. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0.
4ec37da27b4c2bc377cee005689b9de7e837a03542a60ce1130758c857cb9228
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
f2d64c708752ad3e068313998edc5a88bd530b017e771918db72e89acf5e2cad
Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.
4240ea8c17816129fd4b8407b02fe427cc3e858dc7d9f96b40b33de1cc2d9f8f
Joomla! Jtag Members Directory component version 5.3.7 suffers from an arbitrary file download vulnerability.
b3c650eda5b1320889be902af43e61bbe672b52ef83b4fa414b3a84a7a3d4244
Vastal I-Tech Facebook Clone version 2.9.9 suffers from a remote SQL injection vulnerability.
6a4bea54f96a5388d0ed25f3ed57426f8302b6dd95638d6d8757dfbebc4c3bd1
Joomla! JS Support Ticket component version 1.1.0 suffers from a cross site request forgery vulnerability.
ce31c0f8fae594bdf237ff159fc0abe2483f66c6f5f97714b20b2d1a73960d47
Rapid7 Nexpose version 6.4.65 suffers from a cross site request forgery vulnerability.
e7c745111bca375c04ee03dcf7781e4229cfd0f896ab6adfb526dd9f0698eb8a
Task Rabbit Clone version 1.0 suffers from a remote SQL injection vulnerability.
28acaa8464d5d53ee96e286187504a97412ced591ecad0cdbb48285e0f4e9eb1
Multilanguage Real Estate MLM Script version 3.0 suffers from a remote SQL injection vulnerability.
c124e5e6f20a1618178278f76123c575b5f215dbb28f05ba794538b649452c9b
Hot Scripts Clone Script version 1.0 suffers from a remote SQL injection vulnerability.
8d87d3513f657395cefd5f7bd541b0222e61264c0b030d61d099872254ca733e
TSiteBuilder version 1.0 suffers from a remote SQL injection vulnerability.
3d6dc767a3f5bd4a4522a01989d30d6b425b38117b8dbc8dad253b7e4b58c1b6
PACSOne Server version 6.6.2 DICOM Web Viewer suffers from a directory traversal vulnerability.
8d5c8c155ad89a7a3044e6f849518130dbd7b096229f94fb11378d78060247cb
PACSOne Server version 6.6.2 DICOM Web Viewer suffers from a remote SQL injection vulnerability.
77e4372120a491026617430c318387596bd299311ac58c8535102f7e06d9757f
Trend Micro Threat Discovery Appliance versions 2.6.1062r1 and below suffer from a dlp_policy_upload.cgi remote code execution vulnerability.
8320cd451f55d0feeed44694d94eb4d4ebd31a347fc8e66647043d1614a99308
Gnew version 2018.1 suffers from a cross site request forgery vulnerability.
79f94ef3e3938a950bb5097bfaf05e55dbfbde4779f1e1fa4d82f7faff04414e
80 byte small Linux/ARM reverse TCP shell (192.168.1.1:4444/TCP) null-free shellcode.
35f7e7e1877ddd7a520bce4c884f5cc2589318752de95be4a47de363ee722110
12 bytes small Linux/x86 egghunter shellcode.
fe608657531464244ba0fcdcaf55bcdccafd471e55a385c7e7fa19e06d8989ab
Netis-WF2419 suffers from a cross site request forgery vulnerability.
6313ad8b216f8f105926c36e32be0fe6d548167e3d020d1c809948b4e8ce2ec7