There is a vulnerability in jscript9 that could be potentially used by an attacker to execute arbitrary code when viewing an attacker-controlled website in Internet Explorer. The vulnerability has been confirmed on Windows 10 64-bit with the latest security patches applied.
a69629e9e2a8eed322ffb78022a68eb8a35d57aa71fce77bfd75edc522377bec
Ubuntu Security Notice 4952-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.25 in Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. Ubuntu 18.04 LTS has been updated to MySQL 5.7.34. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.
e0384c943fbe4302a704fa1994a32fac80ef8d8c4c984ce0b8d53eb3dca2a375
Ubuntu Security Notice 4932-2 - USN-4932-1 fixed a vulnerability in Django. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that Django incorrectly handled certain filenames. A remote attacker could possibly use this issue to create or overwrite files in unexpected directories. Various other issues were also addressed.
0e071834130616c09f5f1edb4fca81a0a926a05a1e979972298fe8c087bf55b0
Firefox 72 IonMonkey JIT type confusion exploit.
3fe95937807b41ab16381267f14255f360832ec23f36bb19d0249864c2fb2798
ScadaBR versions 1.0 and 1.1CE authenticated shell upload exploit written for Windows targets.
9210869fa94e41f6f6ef63aecc9d1ebbba972eb5a529c95dadfb1239861731d7
Microsoft Internet Explorer 8/11 and WPAD service Jscript.dll use-after-free exploit.
aa077e4edafafb5f0450fba78b760fed0bf732ec0cdb9114581b916849860c12
ScadaBR versions 1.0 and 1.1CE authenticated shell upload exploit written for Linux targets.
2a0345665dc52ccee413e7c98da586cf603e0e659c5a93adc4f3788c3ff1795e
OpenPLC WebServer version 3 authentication remote code execution exploit.
682f96df1b4b8a0f370853102a14e7e97bdfde73f5dd8b8422985361a73161e4
Dental Clinic Appointment Reservation System version 1.0 suffers from multiple remote SQL injection vulnerabilities with one of them allowing for authentication bypass.
1f9795d213a99dc685be57f134b44442736f17fa7d091f071529d05ea80a0c90
ZeroShell version 3.9.0 remote command execution exploit.
96c5da86a5778d99416aad82b1040be38451d87a9ecabe804150409665073dbd
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
2d2b602daca67f890bdea704fb90112924569ee1725d10638086b084669d6971