A security issue was fixed in the 4.15 kernel. This issue affects the 5.4 kernel as well, but a livepatch is not yet available. While work is continuing to develop livepatches for all affected kernels, due to the severity of the issue, they are releasing patches as they become ready. Or Cohen discovered that the AF_PACKET implementation in the Linux kernel did not properly perform bounds checking in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
a13ec104389455bc48ad854bb63cf714af2cc7fd1932c7dc38c32db57bf0e5c6
Mobile Shop System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
2cc69bdfefad255d949a9b6e712e5795c817d2f76d3c9909e8385fbee825629d
The ZTE F602W router suffers from a CAPTCHA bypass vulnerability.
d415cdf47406b19582ff80faa7fa04887c852fb59dd457fd1341d4fd6f1226cb
Tiandy IPC and NVR version 9.12.7 suffer from a credential disclosure vulnerability.
9c7fcb1c91907d757626bd72183d93954fd6dd746048d7043f2f74b410b41822
CuteNews version 2.1.2 remote code execution exploit.
d220768cceb26827a8dabeb01a7df4046a753b0e28e0c60cba3f86088e976bd3
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.
1ebcc73815b00df7b7f578d34cd0278030857b6c082aaff416016b00d3d1cb67
IlchCMS version 2.1.37 suffers from multiple cross site scripting vulnerabilities.
2a0761c84501dac4be159617b4b68553d1c32bb9748ab241264005348354dca5
Red Hat Security Advisory 2020-3723-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 85.0.4183.83. Issues addressed include information leakage, integer overflow, and use-after-free vulnerabilities.
05288c4771f7a5e29002f87f353b69d5eb2d3b160f9d09e944472ba4a79e90df
Red Hat Security Advisory 2020-3714-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
86eb5d9be570e43489fb5f9e58f36b226905a33ab8864399ec6474723ed18e0e
Red Hat Security Advisory 2020-3713-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Issues addressed include a resource exhaustion vulnerability.
fb59fad9d07e625d5f38b44bf743d2a63224244c690ddb5fc7e29a99b4d2b051
Red Hat Security Advisory 2020-3711-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
a7913bea70a7ad2599540b6baeb5db433f888515c9be897e899fea9f25382f44
Red Hat Security Advisory 2020-3708-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
e71f850bf31d4a3392abd4a785c18b8e5c87026f00dc2c19ff80595ddc381c9d
Red Hat Security Advisory 2020-3706-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
9ae84ecbb92bcdf4bb8792dd3e49cba6403992ffee34a1869485ccc10d5db3c5
Red Hat Security Advisory 2020-3704-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
bc91e62b6baec7aa726e4eb3333dc4be943913148a8453451cbd6094e3100894
Red Hat Security Advisory 2020-3702-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
ea1c843bf1aa46c02dc0ad69647add6bcff29c84f01569e891baa41111d070cd
Gentoo Linux Security Advisory 202009-3 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 85.0.4183.102 are affected.
315778c2a3631023e6e8f5408b132e382b52a5c472a2469723262170ede429ba