General
Articles
- CVE-2011-3389: SSL v3/TLS 1.0 BEAST security vulnerability
- CVE-2015-6563: openssh: Privilege separation weakness
- CVE-2016-6329: SWEET32 attacks against 3DES Ciphers (openvpn)
- CVE-2016-10010 openssh: privilege escalation via Unix domain socket forwarding
- CVE-2015-6564 openssh: Use-after-free bug with PAM support
- CVE-2017-7279: Unitrends user privilege escalation
- CVE-2017-7284: Unitrends forced password change in users.php
- CVE-2017-7281: Unitrends unrestricted report file upload
- CVE-2017-7283: Unitrends RCE in restore.php filenames
- CVE-2015-5600: openssh: MaxAuthTries limit bypass
- CVE-1999-0505: Microsoft Windows SMB Guest Account User Access
- CVE-2018-3646 kernel: L1 Terminal Fault: VMM
- CVE-2017-6464 ntp: Denial of Service via malformed config
- CVE-2017-7805 nss: Potential use-after-free in TLS 1.2 server
- CVE-2017-12163 samba: server memory information leak over SMB1
- CVE-2016-10011 openssh: Leak of host private key material to privilege-separated child process via realloc
- CVE-2018-6328 Unitrends: RCE with backquotes in /api/hosts/ parameters
- CVE-2018-6329 Unitrends: sqli authentication bypass RCE
- CVE-2011-3368: httpd: reverse web proxy vulnerability
- CVE-2014-0098 httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS
- CVE-2016-8743 httpd: Apache HTTP Request Parsing Whitespace Defects
- CVE-2017-7980 qemu: OOB r/w access issues in bitblt routines
- CVE-2017-7494: samba RCE from a writeable share "SambaCry"
- CVE-2017-1000364: kernel: stack guard page flaw
- CVE-2017-1000370: kernel: PIE binary stack overrun
- CVE-2016-3115: openssh: bypass SSH restrictions
- CVE-2017-1000405 kernel: Huge Dirty Cow vulnerability
- CVE-2018-3665 Kernel: FPU state information leakage via lazy FPU restore
- CVE-2018-3639 hw: cpu: speculative store bypass
- CVE-2012-5568 tomcat: Slowloris denial of service