Core FTP Server version 1.2 buffer overflow proof of concept exploit.
e51b115e282e22f8eb70f8926781e1be7f647f3ad859e91402bf0c87c5d703bb
The servicemanager, keystore and drmserver all use getpidcon function to get the security context of the caller from a binder. When combined with a one way binder transaction this results in getting the security context of the current process which might allow a selinux mac bypass.
2490431986cf0e3ac461ee3404bc3e4c47f1124ec963ad8e900b6344954fe156
A crash was observed in an ASAN build of Wireshark (current git master), by feeding a malformed file to tshark.
a9c690614b625bb6e5172e86cdd465b90ff09e43557968287968a407281a00eb
A crash was observed in an ASAN build of Wireshark (current git master), by feeding a malformed file to tshark.
cc44a554664cced1126d7b0eefa4b8b8ae37e321ffffa876f3e526a0ffcaef9b
A crash was observed in an ASAN build of Wireshark (current git master), by feeding a malformed file to tshark.
c861f9e59caf134ae57436cc31633c01b724e7061729a02b6ad1d5423e02767b
There is a type confusion vulnerability in the SimpleButton constructor. Flash stores an empty button to use to create buttons for optimization reasons. If this object is created using a SWF tag before it is created in the Button class, and it not of type Button, type confusion can occur.
7599e6513ebba54c924cb1897955fa83dea113a866068a2d1b4b039d4ac55dc5
Red Hat Security Advisory 2016-0286-01 - Chromium is an open-source web browser, powered by WebKit. Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. All Chromium users should upgrade to these updated packages, which contain Chromium version 48.0.2564.116, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.
4cf4e22431bdf03448a4e3f512c5d26c9e0068809e598361c11a60b7f1028dfe
libquicktime version 1.2.4 suffers from an integer overflow vulnerability.
a18ee42207f71292921df36339bb1b46024cc2f78247f2097c3c4680d968095c
OpenCms version 9.5.2 suffers from a cross site scripting vulnerability.
90836f4c2cffaaf16a53502663f30a5c82ff5d7140b8933a573d1c03a30e34a1
Ubiquiti Networks airCRM suffers from a cross site scripting vulnerability.
f2b775e79d03a2cc370f6a2bf89471ee03eb635b2394f01e29521174484b003d
InstantCoder version 1.0 suffers from local file inclusion and directory traversal vulnerabilities.
32b72fde3ade255be3337d1086e3aadf7c3b2e00de7b7ebefe855c625ae0613f
ResourceLinkFactory.setGlobalContext() is a public method and was accessible by web applications running under a security manager without any checks. This allowed a malicious web application to inject a malicious global context that could in turn be used to disrupt other web applications and/or read and write data owned by other web applications. Apache Tomcat versions 7.0.0 through 7.0.67, 8.0.0.RC1 through 8.0.30, and 9.0.0.M1 through 9.0.0.M2 are affected.
ac830c66f4618379f15b9c52065d4800a58e4532b36aa5e987cfc5a7dea7eb16
Prezi suffers from a cross site scripting vulnerability.
ed4edac103084550d1c46e24e4481ef4e689b50adc09f57ba98e58bad2c1e956
When accessing a directory protected by a security constraint with a URL that did not end in a slash, Tomcat would redirect to the URL with the trailing slash thereby confirming the presence of the directory before processing the security constraint. It was therefore possible for a user to determine if a directory existed or not, even if the user was not permitted to view the directory. The issue also occurred at the root of a web application in which case the presence of the web application was confirmed, even if a user did not have access. Apache Tomcat versions 6.0.0 through 6.0.44, 7.0.0 through 7.0.65, and 8.0.0.RC1 through 8.0.29.
f43d6dbb774b4dfc48b17b117d3cde0c12a7d82fc18efc497696311d683c01f8
Debian Linux Security Advisory 3486-1 - Several vulnerabilities have been discovered in the chromium web browser.
6412bc588604122925aaa48d9159949366b995488084328d43e304f5bfee3719
HP Security Bulletin HPSBHF03544 1 - Potential security vulnerabilities in cURL and libcurl have been addressed with HPE iMC PLAT and other HP and H3C products using Comware 7. The vulnerabilities could be exploited remotely resulting in unauthorized access. Revision 1 of this advisory.
85b2d81dc1b3f872228664d35268d8bbb970c56095b755f549519a9b80b7f991
Debian Linux Security Advisory 3485-1 - Alexander Izmailov discovered that didiwiki, a wiki implementation, failed to correctly validate user-supplied input, thus allowing a malicious user to access any part of the filesystem.
de7c36e76f0e614ecfa9779f41047f243f70850b23536a99e00de9a848956e1e
Ubuntu Security Notice 2911-1 - It was discovered that the Linux kernel keyring subsystem contained a race between read and revoke operations. A local attacker could use this to cause a denial of service (system crash).
c1d1a96c7e89baed2b724784ee9c7e56babd900204217955717b0dd16b55c9f3
Ubuntu Security Notice 2911-2 - It was discovered that the Linux kernel keyring subsystem contained a race between read and revoke operations. A local attacker could use this to cause a denial of service (system crash).
c9ed535541ec0c4f4515317d0d00db4bc2935771d6ef87c35aa8526850ee5943
Ubuntu Security Notice 2909-1 - halfdog discovered that OverlayFS, when mounting on top of a FUSE mount, incorrectly propagated file attributes, including setuid. A local unprivileged attacker could use this to gain privileges. halfdog discovered that OverlayFS in the Linux kernel incorrectly propagated security sensitive extended attributes, such as POSIX ACLs. A local unprivileged attacker could use this to gain privileges. Various other issues were also addressed.
47eca111b5e14e6a83d4d3e3e108c3c0f4bb558525426c43eb0ea1c7acf76544
Ubuntu Security Notice 2910-1 - halfdog discovered that OverlayFS, when mounting on top of a FUSE mount, incorrectly propagated file attributes, including setuid. A local unprivileged attacker could use this to gain privileges. halfdog discovered that OverlayFS in the Linux kernel incorrectly propagated security sensitive extended attributes, such as POSIX ACLs. A local unprivileged attacker could use this to gain privileges. Various other issues were also addressed.
d315767d6b74fc5875e1959ee3b8350c03d865880496c94d9e5829712fcd69a4
Ubuntu Security Notice 2908-2 - halfdog discovered that OverlayFS, when mounting on top of a FUSE mount, incorrectly propagated file attributes, including setuid. A local unprivileged attacker could use this to gain privileges. halfdog discovered that OverlayFS in the Linux kernel incorrectly propagated security sensitive extended attributes, such as POSIX ACLs. A local unprivileged attacker could use this to gain privileges. Various other issues were also addressed.
3bd3447a7566b4ddafb9950b75297f97dfae5f898ad9d051beef16b3a2597662
Ubuntu Security Notice 2908-3 - halfdog discovered that OverlayFS, when mounting on top of a FUSE mount, incorrectly propagated file attributes, including setuid. A local unprivileged attacker could use this to gain privileges. halfdog discovered that OverlayFS in the Linux kernel incorrectly propagated security sensitive extended attributes, such as POSIX ACLs. A local unprivileged attacker could use this to gain privileges. Various other issues were also addressed.
8716f9dfa5387ac6e3e6ff94510d7161d98367b8036548e12a2e1d81732e1f1c
Ubuntu Security Notice 2908-1 - halfdog discovered that OverlayFS, when mounting on top of a FUSE mount, incorrectly propagated file attributes, including setuid. A local unprivileged attacker could use this to gain privileges. halfdog discovered that OverlayFS in the Linux kernel incorrectly propagated security sensitive extended attributes, such as POSIX ACLs. A local unprivileged attacker could use this to gain privileges. Various other issues were also addressed.
07596e6ec12eeb907c4ab0d2cdc1c2ab789da78a8039e9d891d2a3f13f37c5f4
Ubuntu Security Notice 2907-2 - halfdog discovered that OverlayFS, when mounting on top of a FUSE mount, incorrectly propagated file attributes, including setuid. A local unprivileged attacker could use this to gain privileges. halfdog discovered that OverlayFS in the Linux kernel incorrectly propagated security sensitive extended attributes, such as POSIX ACLs. A local unprivileged attacker could use this to gain privileges. Various other issues were also addressed.
963e536d218f0e81e41ebb8a8147fbedb301ff6538499599412b9b5c1093f890