Debian Linux Security Advisory 4979-1 - Multiple security issues were found in MediaWiki, a website engine for collaborative work, which could result in cross-site scripting, denial of service and a bypass of restrictions in the "Replace Text" extension.
06176c981f1d58f0f9edda13490bab91be54d95bb5798e246ed35a9680a8f125
Debian Linux Security Advisory 4980-1 - Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service or the the execution of arbitrary code.
ddc750d896a05a7739ac3c32ccc088274d91a7af3ee492e2f13ec7ec5e11244b
Debian Linux Security Advisory 4981-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code.
99551d92649283f19e6aad4ee86b4024215039c66cabc8b02ed7124fed7b74bc
Debian Linux Security Advisory 4982-1 - Several vulnerabilities have been found in the Apache HTTP server, which could result in denial of service. In addition a vulnerability was discovered in mod_proxy with which an attacker could trick the server to forward requests to arbitrary origin servers.
7db80ce9950cf39bde931c5a0d161d513946d1d1b1ee44990405a9c7cee50a76
Debian Linux Security Advisory 4983-1 - Pavel Toporkov discovered a vulnerability in Neutron, the OpenStack virtual network service, which allowed a reconfiguration of dnsmasq via crafted dhcp_extra_opts parameters.
ae710f0c5eab343d5d187ff386bcfbb45872e736dea1d7e2fdeed1e91997000b
Debian Linux Security Advisory 4984-1 - Two vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in denial of service.
6488b004ab2f9591ba5d76915b988b96c1d460fdc656175d210e224d5d780dca
Debian Linux Security Advisory 4985-1 - Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform Cross-Site Scripting (XSS) attacks or impersonate other users.
7455759db9610a025381f5e857e49fd4eaf9a961833df2aafd1baa239b71ac68
Debian Linux Security Advisory 4987-1 - Richard Weinberger reported that unsquashfs in squashfs-tools, the tools to create and extract Squashfs filesystems, does not check for duplicate filenames within a directory. An attacker can take advantage of this flaw for writing to arbitrary files to the filesystem if a malformed Squashfs image is processed.
5bdedd741ddca312ddaa409fd8416bc522c6f837900bc51f74100ec3ea343990
Debian Linux Security Advisory 4988-1 - Two security issues have been discovered in LibreOffice's support for digital signatures in ODF documents, which could result in incorrect signature indicators/timestamps being presented.
7a2f69584a68e18f7b4e9fe262d01785022f6acbab6a103271def9bad9c2d7c4
Debian Linux Security Advisory 4989-1 - Researchers at the United States of America National Security Agency (NSA) identified two denial of services vulnerability in strongSwan, an IKE/IPsec suite.
232a30dd171d73173c62899a6b754e2031ebe12470c78f293d68f6b6dcaeb40d
Debian Linux Security Advisory 4990-1 - Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.
1d7448dffc88dd9ac7649a61dd02bfa08687de81384f332104dca5cc97e6d328
Debian Linux Security Advisory 4991-1 - Several vulnerabilities were discovered in mailman, a web-based mailing list manager, which could result in arbitrary content injection via the options and private archive login pages, and CSRF attacks or privilege escalation via the user options page.
954d8b9822764173dd884577e87a44ad7f9a8af40f4ebc025e3d191931336710
Debian Linux Security Advisory 4992-1 - An out-of-bounds read and write flaw was discovered in the PHP-FPM code, which could result in escalation of privileges from local unprivileged user to the root user.
7eec7aed62e18b2dfec41e256af21cc45159a0fae6aba1c3dd50596c44e2a3b6
Debian Linux Security Advisory 4993-1 - An out-of-bounds read and write flaw was discovered in the PHP-FPM code, which could result in escalation of privileges from local unprivileged user to the root user.
868f99b2a929439d737bae2acf46f1a13320c4b591cc7b1b3f0ca81ca5a720c6
Debian Linux Security Advisory 4994-1 - Kishore Kumar Kothapalli discovered that the lame server cache in BIND, a DNS server implementation, can be abused by an attacker to significantly degrade resolver performance, resulting in denial of service (large delays for responses for client queries and DNS timeouts on client hosts).
6b2e7883cbd2f8d358fcc2ce92917fa1346abea172baacdc2b580e56e150203d
Debian Linux Security Advisory 4995-1 - Vulnerabilities have been discovered in the webkit2gtk web engine.
56293c36337dba30ef591ea81eef079c417077dc72af4c13f968613d883f56ca
Debian Linux Security Advisory 4996-1 - The following vulnerabilities have been discovered in the wpewebkit web engine.
bb243531bc6a39ae06f45f1996bcbea68d212382918c06fb0306d81fafe45a44
Debian Linux Security Advisory 4997-1 - A flaw was discovered in tiff, a Tag Image File Format library, which may result in denial of service or the execution of arbitrary code if malformed image files are processed.
6d87a028dc3e9fe42ac87d6bd2d53f8c71111bffd76fdc714046d6702d2b3fc7
Debian Linux Security Advisory 4998-1 - Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.
f1c4248ed3e119fcdaf096fcccefd8168cc6cd57a866a78b2d7041f85c076076
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.
15ce1a37b4cc175b07761e00acdcfa2c08f0d23d6c3ab9c97c464bd38cc5476a
Red Hat Security Advisory 2021-4012-01 - Red Hat support for Spring Boot provides an application platform that reduces the complexity of developing and operating applications for OpenShift as a containerized platform. This release of Red Hat support for Spring Boot 2.4.9 serves as a replacement for Red Hat support for Spring Boot 2.3.10 and includes security, bug fixes, and enhancements. For more information, see the release notes listed in the References section.
ad5a223d35cf4cbbf00fc0835b2b348db5c25cea1db02646b8b345b9c3a7462b
Ubuntu Security Notice 5125-1 - It was discovered that PHP-FPM in PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
d21525acd8302ff0a222bb83d5aaf4626c4e5306cce80cee1e2e72aac37eef61
This Metasploit module exploits an SID-based command injection in Sophos UTM's WebAdmin interface to execute shell commands as the root user.
e60408784254ddfee031c720b657d15c09df5d27e903311833f4a7f181588725
Backdoor.Win32.Prorat.ntz malware suffers from having a weak hardcoded password.
3242b7623dddcedfdaa1321d459bb30a8fe2211541d728a66a0771f0c38c14e3
Backdoor.Win32.Prorat.ntz malware suffers from a man-in-the-middle vulnerability.
b496833c9943b356b5e36c3d403fc166db28d62f58c8ad54909b0349ddab2d12