OrbiTeam BSCW Server versions 5.0.x, 5.1.x, 5.2.4 and below, 7.3.x and below, and 7.4.3 and below suffer from path traversal, cross site scripting, HTTP header, session object manipulation, local file inclusion, and user enumeration vulnerabilities.
010e38c96f2418d6360c9dcbb77e24409850905a15f68e92a39487807a819dba
Red Hat Security Advisory 2021-4913-04 - Mailman is a program used to help manage e-mail discussion lists. Issues addressed include bypass and cross site request forgery vulnerabilities.
c0b2367bca6b9519cbf4eef54ab3a7cc8eece40d1140a7de1f14b7331fe671bd
Red Hat Security Advisory 2021-4827-06 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a bypass vulnerability.
b556183748ad2f43109872776d519186cfaaa31bf887b6bde42a67fdf1052a0f
Backdoor.Win32.WinShell.50 malware suffers from a hard-coded password vulnerability.
ef9e9c606f58b1f8d1b12986e7997deed797a31aaf8d4ef1e635ba6a56995d08
WordPress All-In-One Video Gallery plugin versions 2.4.9 and below suffer from a local file inclusion vulnerability.
d56b622c5cdb0577129bc8f0f22407486cb0a913ccea8f94ea9c2c7839d09689
This Metasploit module exploits a vulnerability in Ubuntu's implementation of overlayfs. The vulnerability is the result of failing to verify the ability of a user to set the attributes in a running executable. Specifically, when Overlayfs sends the set attributes data to the underlying file system via vfs_setxattr, it fails to first verify the data by calling cap_convert_nscap. This vulnerability was patched by moving the call to cap_convert_nscap into the vfs_setxattr function that sets the attribute, forcing verification every time the vfs_setxattr is called rather than trusting the data was already verified.
db2db701a06e20ebab9c0759df9c3b43a3146ecf6b60cce3c13e3d0541420302
Red Hat Security Advisory 2021-4915-02 - Mailman is a program used to help manage e-mail discussion lists. Issues addressed include bypass and cross site request forgery vulnerabilities.
ae9ebdc6a6b3f3d493d2dcf2934db0f74cca8bd213ab14ece18aa1f758476438
WordPress Slider By Soliloquy plugin version 2.6.2 suffers from a persistent cross site scripting vulnerability.
a6e8a1b148a01f35b66f3ed997e436335c2db30eb476d28d7c01ec847bcd314d
Backdoor.Win32.WinShell.50 malware suffers from a hard-coded password vulnerability.
206049766aef730f0b02673e3da8b31e6febcb93685ce3a611d032499372094b
Red Hat Security Advisory 2021-4919-03 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
554c0c26251078d2735ca84a6c4ad976bca3ae57660b2223fb286b3afc579b26
WordPress DZS Zoomsounds plugin version 6.45 suffers from an unauthenticated arbitrary file read vulnerability.
f036164c36ce4ac2ea0ffa900fd6d639672f6056b1a299c46bbca574da4081b8
Online Magazine Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
2d63a21552896a8c911f7d87d90ee648a8fb74a7a51fa50678b3eaefa3982e0d
Red Hat Security Advisory 2021-4910-03 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.8.3 RPMs.
407aa3440f785d4102a619c11854ed17818472f50c38d3d98dffdd74b34d9a94
Backdoor.Win32.Bionet.10 malware suffers from bypass and code execution vulnerabilities.
43241e1d136b0442d80206168f452e3a162c31f74ef36e03598e9cbfdc6b1755
Backdoor.Win32.Vernet.axt malware suffers from an insecure permissions vulnerability.
999d275a7d62a955295dc2d227ba2e5020fc3c66b3f92c960a9457494396d749
Red Hat Security Advisory 2021-4916-01 - Mailman is a program used to help manage e-mail discussion lists. Issues addressed include bypass and cross site request forgery vulnerabilities.
9300feba4300b0658f042c5c469b8856a41deeb1e5b2cc3499bf1d666f38237e
Red Hat Security Advisory 2021-4799-05 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.51. Issues addressed include a bypass vulnerability.
9cf5ee59047d85a523da7c56ae10aff70f12b50b632551d99c1b0ff954dd1673
M-Files Web versions prior to 20.10.9524.1 and M-Files Web versions prior to 20.10.9445.0 contain an improper range header processing vulnerability. A remote unauthenticated attacker may send crafted requests with overlapping ranges (via HTTP requests with a specially-crafted Range or Request-Range headers) to cause the web application to compress each of the requested bytes, resulting in a crash due to excessive memory and CPU consumption and preventing users from accessing the system.
156f6be8e8269992c6311ee1cad599e1338e7f7bf24b2810bb20c39727986b7c
Online Pre-Owned / Used Car Showroom Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
8b1f7a445c72e74fb0fdbbc5d478d8dfebdf35379de0009bd2c22ae49c57edf8
Trojan.Win32.Mucc.ivk malware suffers from an unquoted service path vulnerability.
6aeff1461904ffcb843da2727bbc7484535a976547ef7c746da6695da94c34cb
DuckDuckGo version 7.64.4 suffers from an address bar spoofing vulnerability.
efdcb758ade79facf3f10510cb498316be314f1e2b14b262a9abfbe486f35f4c
Red Hat Security Advisory 2021-4914-06 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains the following OpenShift Virtualization 4.8.3 images: RHEL-8-CNV-4.8.
fd59966d097a080a7ded93322ccdd6a60d15159920ee6f8c093487695abfb467
Red Hat Security Advisory 2021-4918-03 - A minor version update is now available for Red Hat Camel K that includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, denial of service, deserialization, information leakage, privilege escalation, and server-side request forgery vulnerabilities.
d5c90a3e7232924ae6e8b38f5e9ef8c694af77ff921bcdb7b07c49f3c69e7068