Ubuntu Security Notice 4433-1 - Johannes Kuhn discovered that OpenJDK incorrectly handled access control contexts. An attacker could possibly use this issue to execute arbitrary code. It was discovered that OpenJDK incorrectly handled memory allocation when reading TIFF image files. An attacker could possibly use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly handled input data. An attacker could possibly use this issue to insert, edit or obtain sensitive information. Various other issues were also addressed.
8e8cb87ca79806cf6127f395fb824cde823abf6a54241c7e85eaa05eb4ab39df
EternalBlueC is the EternalBlue suite remade in C which includes an MS17-010 exploit, EternalBlue/MS17-010 vulnerability detector, DoublePulsar detector, and DoublePulsar UploadDLL and shellcode.
f58498ce3ca66c84f0bc061eb5766104eb7d8e10ed8cedcec829db3061d61bea
Red Hat Security Advisory 2020-3133-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.4.4 serves as a replacement for Red Hat AMQ Broker 7.4.3, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a denial of service vulnerability.
33ec272ba760814b950affc8130b7170d412faa133a83258e944a6d59f066d27
Ubuntu Security Notice 4430-2 - USN-4430-1 fixed vulnerabilities in Pillow. This update provides the corresponding updates for Ubuntu 20.04 LTS. It was discovered that Pillow incorrectly handled certain image files. If a user or automated system were tricked into opening a specially-crafted image file, a remote attacker could possibly cause Pillow to crash, resulting in a denial of service. Various other issues were also addressed.
380d4f373b158569d565b55349373f7849142e22dec46f36f4e1f183a7cace01
Red Hat Security Advisory 2020-2905-01 - This release of Red Hat build of Thorntail 2.7.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section. Issues addressed include bypass, code execution, cross site scripting, memory exhaustion, and traversal vulnerabilities.
c38261c0e1296dd1542569082b9ba44974a529f19ff358410a12de10337e694e
Red Hat Security Advisory 2020-3118-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allows PC-compatible machines to share files, printers, and various information. Issues addressed include null pointer and use-after-free vulnerabilities.
2fab0ac15956ce9836beab8eddf7f9e7e829e49cf8e1cbe162dfecf7982d7ad6
Red Hat Security Advisory 2020-3119-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Issues addressed include null pointer and use-after-free vulnerabilities.
676dddcd89d65ac6055af4de6712adb1179a0a0ccdcd5803bcc4f8d10979d3c4
Ubuntu Security Notice 4431-1 - It was discovered that FFmpeg incorrectly verified empty audio packets or HEVC data. An attacker could possibly use this issue to cause a denial of service via a crafted file. This issue only affected Ubuntu 16.04 LTS, as it was already fixed in Ubuntu 18.04 LTS.
09360fbe76e434880b49f3b0bb8961f0d26db5eb0724966fb2ef006d9225dff2
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
0f8a324c594df6903065df369239125062b21eec1ea661666a6383e87b81397e
FTPDummy! version 4.80 local SEH buffer overflow exploit that pops calc.exe.
e789aa53f0af9ec818e490ac9835551daa25841a122ea62cfaa02d45e30c11e0
This is a modified remote code execution exploit for Online Book Store version 1.0.
258734217c1ebfc32752dcfa5912fa225ab5c1df733098ee5f95f5082863e524