Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
d1acb24735fd35e18e9b7a0555ec58277c2b87da45a19ebeb8087c3dda55f47d
This Metasploit module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user. The specific flaw exists within the management interface, which listens on TCP port 443 by default. The Trend Micro Officescan product has a widget feature which is implemented with PHP. Talker.php takes ack and hash parameters but doesn't validate these values, which leads to an authentication bypass for the widget. Proxy.php files under the mod TMCSS folder take multiple parameters but the process does not properly validate a user-supplied string before using it to execute a system call. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the web server user.
533339b2e9cfb58d88fe79c7a17a4f87348ca31165bf2459d2e7dc2caa154258
Ubuntu Security Notice 3442-1 - It was discovered that libXfont incorrectly handled certain patterns in PatternMatch. A local attacker could use this issue to cause libXfont to crash, resulting in a denial of service, or possibly obtain sensitive information. It was discovered that libXfont incorrectly handled certain malformed PCF files. A local attacker could use this issue to cause libXfont to crash, resulting in a denial of service, or possibly obtain sensitive information. Various other issues were also addressed.
30b27a28193951828312148232f8c01ea200f256709d21af384a940152c4fe92
WordPress Ad Widget plugin versions 2.10.0 and below suffer from a local file inclusion vulnerability.
4dca75cd604be2d9ee5f59b3df5a6b97e028b213c809e41dec3862eafa62e6c7
Ubuntu Security Notice 3441-1 - Daniel Stenberg discovered that curl incorrectly handled large floating point output. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. Even Rouault discovered that curl incorrectly handled large file names when doing TFTP transfers. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive memory contents. Various other issues were also addressed.
b0130c23f8916e72e2b583e6c7d268af318bf605fb5e0b272a99a1657ec8a6c0
WordPress Simple Login Log plugin version 1.1.1 suffers from multiple remote SQL injection vulnerabilities.
fe442cde72653defe51ab63edea37018252e0e898b0851ee4a61c92bdfdc035c
Red Hat Security Advisory 2017-2869-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A race condition was found in the Linux kernel, present since v3.14-rc1 through v4.12. The race happens between threads of inotify_handle_event() and vfs_rename() while running the rename operation against the same file. As a result of the race the next slab data or the slab's free list pointer can be corrupted with attacker-controlled data, which may lead to the privilege escalation.
2c093cfe3a6362e9d3175b0d9885b9b9bb9d4ade02e8f45dd8a1a2fa06d59958
This Microsoft bulletin lists dozens of updates for October, 2017.
3b31d18b292ff73cfe1974afcdb1f997266a5a8d3a88d4c7f180c0e32b94c245
WordPress TR Easy Google Analytics plugin version 1.0.0 suffers from a cross site scripting vulnerability.
ea9d6f445f2db6d613964c18b3a71c4686beb9d26f23bd5d1554ed9afd3ba63a
IBM Notes versions 8.5 and 9.0 encodeURI denial of service exploit.
665e3d77d24d49951bde37e7d172c21162dcd49b47021d00911a8a73b5cb5f21
Subaru's suffer from an issue where the rolling code used by the keyfob and car is predictable in the sense that it is not random. It is simply incremental. An attacker can 'clone' the keyfob and, unlock cars and, when increasing the rolling code with a sufficiently high value, effectively render the user's keyfob unusable. Exploit code included.
8458aea19647ae5b7eab00c281b4787845861d674484600df933adb38473f6a7
The PostgreSQL 10 installer for Windows suffers from a dll hijacking vulnerability.
53508de2e1b750287c30bbe3c9bca27c1d738c50051878d731c03da7ff37006c
ArcGIS Server version 10.3.1 suffers from an RMIClassLoader useCodebaseOnly=false remote code execution vulnerability.
545522cd9fdc53bb73cff1f212207e711bdb3b99b915d2982025352ffc2e9200
Apache Tomcat versions prior to 7.0.8, 8.0.47, 8.5.23, and 9.0.1 (Beta) JSP upload bypass and code execution exploit.
9f631e5a320e03ca0b355844875e6306ba45407ee002501d9bd563bceca5f8a9
ClipShare version 7.0 suffers from a remote SQL injection vulnerability.
458effd7ae06e9c1dc7b21de9744cb6156b02e2ffacd2d4b076251d0f953baa2
Complain Management System suffers from hard-coded credential and remote SQL injection vulnerabilities.
3be585edded8beced2ec612feb0cfb8328342bd18b5adda9d192b4e72f4c2380