Various Ubiquiti Networks products suffers from an authenticated command injection vulnerability.
631501986582df6705affaee85c09b6545ca657c5e93491ca7077b69a38cd9a0
Various AXIS cameras suffer from cross site request forgery and cross site scripting vulnerabilities amongst other issues.
365490dde209cafe4c70f755efc7843b6e66b7ba8c535e04e832ae9478ce59c6
Windows DVD Maker version 6.1.7 suffers from an XML external entity injection vulnerability.
ecb8b0770682bd224f1a7cddbdec5964519b3f5f66637fe46d530d4ab8c8b44b
Ubuntu Security Notice 3235-1 - It was discovered that libxml2 incorrectly handled format strings. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly cause libxml2 to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, and Ubuntu 16.04 LTS. It was discovered that libxml2 incorrectly handled certain malformed documents. If a user or automated system were tricked into opening a specially crafted document, an attacker could cause libxml2 to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
7ae32d61ed583ddb13aeb9dd84d7bf72100683ff8af005c02ecd83a9d0fd2b11
Slackware Security Advisory - New pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
28ab51f1bbc6ebcee4b3ebc5e26e510679e1692947b5f29bb49d591d536e4f4d
Red Hat Security Advisory 2017-0557-01 - Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. This release of Red Hat JBoss BPM Suite 6.4.2 serves as a replacement for Red Hat JBoss BPM Suite 6.4.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Multiple security issues have been addressed.
e9340d00f3107dd94b2af8def51139ae837cd04bcea8700d61c5726b656578a2
Microsoft Internet Information Services web server suffers from a cross site scripting vulnerability.
12b90b1bc2760a0f289e936c198be706b8da8bc5b8bd5cd066fff3e44c267d0a
Cisco Security Advisory - A vulnerability in the Client Manager Server of Cisco Workload Automation and Cisco Tidal Enterprise Scheduler could allow an unauthenticated, remote attacker to retrieve any file from the Client Manager Server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted URL to the Client Manager Server. An exploit could allow the attacker to retrieve any file from the Cisco Workload Automation or Cisco Tidal Enterprise Scheduler Client Manager Server. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
0742ceb22f1861972c1748f3c5cd467a250c277f3d7a11eebfc96fd3898a494d
WordPress Membership Simplified plugin version 1.58 suffers from an arbitrary file download vulnerability.
49f3d2d3c61b472f332fbd1106c4ce7e59776bbb9ab0b8bb84d33daeedbd57c3
Cisco Security Advisory - A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
bd92cac44b2f149009706c1808ced146e1c0f4fc15a1754d8a0e09ca477ef530
Cisco Security Advisory - A privilege escalation vulnerability in the Secure Shell (SSH) subsystem in the StarOS operating system for Cisco ASR 5000 Series, ASR 5500 Series, ASR 5700 Series devices, and Cisco Virtualized Packet Core could allow an authenticated, remote attacker to gain unrestricted, root shell access. The vulnerability is due to missing input validation of parameters passed during SSH or SFTP login. An attacker could exploit this vulnerability by providing crafted user input to the SSH or SFTP command-line interface (CLI) during SSH or SFTP login. An exploit could allow an authenticated attacker to gain root privileges access on the router. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered via both IPv4 and IPv6 traffic. An established TCP connection toward port 22, the SSH default port, is needed to perform the attack. The attacker must have valid credentials to login to the system via SSH or SFTP. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
3af41f251d2f51e2bc77992540bef519775244270fbe2db95d0952bb965612f6
Microsoft Edge suffers from a Chakra incorrect jit optimization with TypedArray setter.
1b46e127b6ddac3b8687236807501f6cf5c33f38c13ddeea9d9b0fab9aaacbcd
AppSamvid suffers from a dll hijacking vulnerability.
3206874bf9be117c086c5018935c2dd5a760287f3aa9af5e6029349319ee83fd
Microsoft Edge has some undefined behavior on some getters.
41c26bf21d6bc2fa7b939d57b5d30ec3fb46e056778a4bc16b4649ad85be103f