Red Hat Security Advisory 2019-3007-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the openshift-enterprise-builder container image for Red Hat OpenShift Container Platform 4.1.20.
1d2c745ed3e6fdf559804be57770089536533992fecafb0deca3f84076106e75
Red Hat Security Advisory 2019-3131-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the cri-o, cri-tools, faq, ignition, openshift-external-storage and pivot RPM packages, which have been rebuilt with an updated version of golang for Red Hat OpenShift Container Platform 4.1.20.
76f232b02c50e3e148690b38c6257480a29ffd8bb1b02a3a1492f99b63118350
Red Hat Security Advisory 2019-3132-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the openshift RPM package for Red Hat OpenShift Container Platform 4.1.20. Issues addressed include a denial of service vulnerability.
0da6b9ae2cb54bdd9f8d8c6fad6d3488dbaaa49734ee804a33d1627d99eaf0c3
Ubuntu Security Notice 4156-2 - USN-4156-1 fixed several vulnerabilities in SDL. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
f1598c807984960ddc6c9d608f15542935e1710077a794ef433dad2e01e8b660
Red Hat Security Advisory 2019-3127-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include deserialization and null pointer vulnerabilities.
e2152d3c4f5d1bb85e164ffc79615c747290fb11facd564d6446eed3375165a5
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
6a3dcc427196927a5cdefd32c290fa352d6405e9bb6d3fe12c71f47d31d98a63
Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability that can be leveraged via malformed JP2 streams.
07bec088df6d1d4a744e1d86ed31a0aac446913a56104312574c18e5470ed87e
Debian Linux Security Advisory 4544-1 - X41 D-Sec discovered that unbound, a validating, recursive, and caching DNS resolver, did not correctly process some NOTIFY queries. This could lead to remote denial-of-service by application crash.
f1986d52522a895bfa5c8dc47abce0383fb467a799ac41ea3dec9af48bcad041
Red Hat Security Advisory 2019-3128-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include deserialization and null pointer vulnerabilities.
8ce4ddf44adaffb5c974d67b15377c5008f824c164d9241e239a726eae1f5b41
Accounts Accounting version 7.02 suffers from a persistent cross site scripting vulnerability.
dfb5a2399d127d942466431d8374e75f4c7d66d50ab47e759c3c40f3e3367d91
Red Hat Security Advisory 2019-3089-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include heap overflow and use-after-free vulnerabilities.
966191adf587e5eeb40216903077535c4dc132a4409dc0d25b960c04cedd1fb2
LiteManager version 4.5.0 suffers from a romservice unquoted service path vulnerability.
4d76f20b4fcc4c0816993f3d2c01180a061c6bf32aec6db996c71b96ee73e0ba
Debian Linux Security Advisory 4509-3 - It was reported that the apache2 update released as DSA 4509-1 incorrectly fixed CVE-2019-10092. Updated apache2 packages are now available to correct this issue.
cb6624cbd5a3bf001dfbacaec03e79bed76d1be5363b53d08b7df0a957671486
Solaris version 11.4 xscreensaver local privilege escalation exploit.
3fa7ecaa53e22bbbf5fa735cf10b22a008a02e7bd17c04bcfd1abb124cb3e6f8
WordPress Broken Link Check plugin version 1.11.8 suffers from a cross site scripting vulnerability.
f991aa671e1155414d56b46b53deb53c6896775b87df7f9a2c23816f792d81ce
Mikogo version 5.2.2.150317 suffers from a Mikogo-Service unquoted service path vulnerability.
9a8378c6e5f9e44d0f29a5fe4bce3a6cc8325828f08c76043e1c1ec6b339229e
Tomedo Server version 1.7.3 suffers from using weak cryptography for passwords and cleartext transmission of sensitive information vulnerabilities.
8d711e0da676cf2252094c7935a28ed2a4570ef2c98c1627aa4945d2065cb776
CyberArk Password Vault version 10.6 suffers from an authentication bypass vulnerability.
0e9b1adc722b6332170f51ef16463135606931c78eda0ead1adb22a59b07b4e3
74 bytes small add user User to /etc/passwd shellcode.
3f2771c906ec4704d9721c76ce05ec176438b7108d68118ba748721929fafd19
25 bytes small Linux/x86 execve /bin/sh shellcode.
6ec3a762f49cf073c4aaf48e89626df8b0be9238e36987f32f78d2e3bcc88c5d
91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode.
e41394ff0ce73676c56d6dc657e2f1f811e92852a6ff50e91919a685056dc893
X.Org X Server version 1.20.4 suffers from a local stack overflow vulnerability.
81d9495e9d1727dfa844b480b1c15dd3ef211fe607e1285219dee4e40f5cf652
Whatsapp version 2.19.216 suffers from a remote code execution vulnerability.
b1c4e9d5cd54513f408c1ec9d9017cd31cfa52c3bd2ca8b5bc7e8a9fe88994d1
Lavasoft version 2.3.4.7 suffers from a LavasoftTcpService unquoted service path vulnerability.
d9ec09ebb3be16249cf66d8e488d046094023afb9a184667a376a8a45c6321dc
Zilab Remote Console Server version 3.2.9 suffers from a zrcs unquoted service path vulnerability.
27ea0d539f61dc6c529eae3421ab648b1d29c2d4d5c6109f3e1bf39b553d12a4