A security issue was fixed in the 4.15 kernel. This issue affects the 5.4 kernel as well, but a livepatch is not yet available. While work is continuing to develop livepatches for all affected kernels, due to the severity of the issue, they are releasing patches as they become ready. Or Cohen discovered that the AF_PACKET implementation in the Linux kernel did not properly perform bounds checking in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
4437085dab38579a25ce71c982fffd06
Mobile Shop System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
d446de8e6a5e8d1e5d9b8e09f97823c7
The ZTE F602W router suffers from a CAPTCHA bypass vulnerability.
fc1d55c923c4b4d3ab9147caedc90b25
Tiandy IPC and NVR version 9.12.7 suffer from a credential disclosure vulnerability.
31af0e01d3411bff4073c4969fab0aa5
CuteNews version 2.1.2 remote code execution exploit.
e176c78c1c1e2baa2f5c4ade2915f4fb
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.
35951476e36aac86030ad9db983650f8
IlchCMS version 2.1.37 suffers from multiple cross site scripting vulnerabilities.
44643740a4ccbef00c29bdf57af23e23
Red Hat Security Advisory 2020-3723-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 85.0.4183.83. Issues addressed include information leakage, integer overflow, and use-after-free vulnerabilities.
3a3ae1c3cfa4b75de5e2102a900dbac4
Red Hat Security Advisory 2020-3714-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
39fb1fdee375d2aac57c16ea2aade943
Red Hat Security Advisory 2020-3713-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Issues addressed include a resource exhaustion vulnerability.
a1345c86b05742f8a013f28048e4fc0d
Red Hat Security Advisory 2020-3711-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
3c8b0682cfca4174923dcf7e2e2deefb
Red Hat Security Advisory 2020-3708-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
491b7e3983ce27aa2088e15be6a312d6
Red Hat Security Advisory 2020-3706-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
8d80bd5dc516d753432f5946be51af9a
Red Hat Security Advisory 2020-3704-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
c16d11918411771f226dc919bb76a5a5
Red Hat Security Advisory 2020-3702-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.
cc41bd25036f924f7e98eed3224a5170
Gentoo Linux Security Advisory 202009-3 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 85.0.4183.102 are affected.
8416b17fa3bef5e21adc86d3c5a2672d