The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands. NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796. (CVSS:7.5) (Last Update:2017-04-04)
CVE-2014-5009
Snoopy allows remote attackers to execute arbitrary commands. NOTE: this vulnerability exists due to an incomplete fix for CVE-2014-5008. (CVSS:7.5) (Last Update:2017-04-04)
CVE-2016-6209
Cross-site scripting (XSS) vulnerability in Nagios. (CVSS:4.3) (Last Update:2017-04-04)
DSA-3825 jhead – security update
It was discovered that jhead, a tool to manipulate the non-image part of
EXIF compliant JPEG files, is prone to an out-of-bounds access
vulnerability, which may result in denial of service or, potentially,
the execution of arbitrary code if an image with specially crafted EXIF
data is processed.
Vuln: WebKit Memory Corruption and Information Disclosure Vulnerabilities
WebKit Memory Corruption and Information Disclosure Vulnerabilities
Vuln: OCaml CVE-2015-8869 Multiple Security Vulnerabilities
OCaml CVE-2015-8869 Multiple Security Vulnerabilities
Vuln: Linux Kernel CVE-2017-7294 Local Denial of Service Vulnerability
Linux Kernel CVE-2017-7294 Local Denial of Service Vulnerability
Vuln: Eject dmcrypt-get-device CVE-2017-6964 Local Code Execution Vulnerability
Eject dmcrypt-get-device CVE-2017-6964 Local Code Execution Vulnerability
CVE-2017-7346
The vmw_gb_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.7 does not validate certain levels data, which allows local users to cause a denial of service (system hang) via a crafted ioctl call for a /dev/dri/renderD* device.
CVE-2017-7253
Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a “Component error: login challenge!” message. The second JSON object encountered has a result indicating a successful admin login.