vCloud Director version 9.7.0.15498291 suffers from a remote code execution vulnerability.
f4a47757f7175f153c8a9f39a8de509339720d12c626ac7f0b8c3470ca073a03
Red Hat Security Advisory 2020-2369-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
5d6bef47ed7eb73de0cc736d97cd2b9a12f3af4fe59ce9df2b9fde9634e2e686
Red Hat Security Advisory 2020-2362-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include cross site scripting and information leakage vulnerabilities.
f9afe68b680120643c572b331860b158db48177f0d186492a47eb68b911a78d0
Apple Security Advisory 2020-06-01-3 - tvOS 13.4.6 is now available and addresses a code execution vulnerability.
b42a866bf2500d21ee112066a86671a0e54157f728b38452da7a4dea4828cd21
Apple Security Advisory 2020-06-01-2 - macOS Catalina 10.15.5 Supplemental Update, Security Update 2020-003 High Sierra are now available and address a code execution vulnerability.
d3f40db6b06019371e9b8b1da88ed8057b256a6f66b24809dfe0c0652587cff1
Apple Security Advisory 2020-06-01-1 - iOS 13.5.1 and iPadOS 13.5.1 are now available and address a code execution vulnerability.
ec007d35f526f018b1be8253c214e57f434bfb4c783b4f6479e434eb3164fec2
Clinic Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
b31c2b919f4f9a121f3bac2d5cbd732d65f820f16f77206a2d9331366870fea3
This Metasploit module exploits a SQL injection vulnerability found in vBulletin versions 5.6.1 and below. This module uses the getIndexableContent vulnerability to reset the administrator's password and it then uses the administrators login information to achieve remote code execution on the target. This module has been tested successfully on vBulletin version 5.6.1 on the Ubuntu Linux distribution.
ab383c3c011e7017caccbf3f14a2893505f109f7315cb558a626bdfe3e283ccb
Red Hat Security Advisory 2020-2354-01 - FreeRDP is a free implementation of the Remote Desktop Protocol, released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Issues addressed include integer overflow and out of bounds write vulnerabilities.
6ef163c230272a3a79884ed58845ee14c7cd340c866a9dbd1f42cd9597f7f481
Ubuntu Security Notice 4380-1 - It was discovered that Apache Ant created temporary files with insecure permissions. An attacker could use this vulnerability to read sensitive information leaked into /tmp, or potentially inject malicious code into a project that is built with Apache Ant.
154081a065dda9921fd699b00ce802717d0a7d90eaf2563ac4a76c20d5c7f45b
Microsoft Windows SMBGhost pre-authentication remote code execution exploit.
ed2ac35e5fce382005bff7d23559c3f72965eed0b632b7eef57568e90b28b4b7
Ubuntu Security Notice 4379-1 - It was discovered that FreeRDP incorrectly handled certain memory operations. A remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code.
89544856cae286a5a32881401dfb658e0bc031d5784b1adfdd80997896139909
Ubuntu Security Notice 4377-2 - USN-4377-1 updated ca-certificates. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. The ca-certificates package contained an expired CA certificate that caused connectivity issues. This update removes the "AddTrust External Root" CA. In addition, on Ubuntu 12.04 ESM and Ubuntu 14.04 ESM, this update refreshes the included certificates to those contained in the 20190110 package. Various other issues were also addressed.
b6612a680c49b264cd5130aceabecad307a0754f32ff9a6a08d8bb69396d8591
QuickBox Pro versions 2.1.8 and below suffer from an authenticated remote code execution vulnerability.
1b4194c340a6de037afbd6c701b3dfafa882faaa1285554b095bb1cc3afa5fe6
Ubuntu Security Notice 4378-1 - It was discovered that Flask incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service.
6696edc54c9fdf0dfdf9425d806f83d431854ab1c64ab7412ac01ab4aafb6dd7
VMware vCenter Server version 6.7 authentication bypass exploit.
61416120dc1c2ebd56567136a1cab0725f5a29c9d0e7f8c6365f8c2fda18ab2d