TP-Link TL-WR841N v13 suffers from an authentication bypass vulnerability via an insecure direct object reference vulnerability.
9995c6b3b6cf275d4bde83f805fb4d5553b3807472d1967cf7e57c4f243ec759
TP-Link TL-WR841N v13 suffers from a blind command injection vulnerability.
92b9e15c1917bfa85cd7b7d7dec306620e04cc32a685a4d63fedfeb461b5460b
TP-Link TL-WR841N v13 suffers from cross site request forgery vulnerabilities.
231860d71c1d24ce794123eae11efe2c36b3ee4500c2bf996f198fb1478e6c91
GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.
2fd71654c81246ff43dbed2cf0471aab564bd17a409d3c225adc63d143e2f1c7
Red Hat Security Advisory 2018-2114-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Telecommunications Update Service for Red Hat Enterprise Linux 6.6 will be retired as of December 31, 2018, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical Impact security patches or Urgent Priority bug fixes, for Red Hat Enterprise Linux 6.6 TUS after December 31, 2018.
9ad875d49b4630107434d8f4cc9e4536e20ba2e184f5f8019cd2eb9c2938b6d0
Cisco Adaptive Security Appliance suffers from a path traversal vulnerability.
d1b313011029126cb865a0362620a79446da5eb04f5aec729d6ccf3667869fe9
Android suffers from multiple race condition vulnerabilities in the media.metrics service.
a656fd451726abc4db30105b2ca67987815f338e9dadcd85a7b86bfb41ec66b0
hycus CMS version 1.0.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
3890bb9f4e195bb91b26e724e6ca0c976e6a3796474aaa2a30288451bed835d7
DIGISOL DG-HR3400 Wireless Router suffers from a cross site scripting vulnerability.
43a7fc7a43a0f80375829d244ab8dc5eff775609451d8f7490c90f4d1f164c57
BEESCMS version 4.0 suffers from an add administrator cross site request forgery vulnerability.
91d00c7ca731162cb70946ad7a59a0daa28377389fe9f5f2bfe23b7d2de5cf25
HongCMS version 3.0.0 suffers from a remote SQL injection vulnerability.
371fe2439b2b311d3f9c6313ebb878f7f4e36e6edebdfcfbc8f1715d36a40bb5
Whitepaper called UAC Bypass and Research with UAC-A-Mola. Written in Spanish.
b7cd8637414e48ef4a16657ae64596678d15f3de8ba472093819698b42b80db3