TP-Link TL-WA850RE suffers from a remote command execution vulnerability.
ccb2009f0451acde9490c9456c9222a9add7de7982cb06e53258577c0be8f60d
Dell EMC RecoverPoint versions prior to 5.1.2 suffer from a local root command execution vulnerability.
dba01fd50ccc998756cc8244a767c12352f600e2ebd9dbbb32b2a494b95eb2df
LFCMS version 3.7.0 suffers from an add administrator cross site request forgery vulnerability.
4eef414314be16a2167f9c6cdf9b031cbe15fd327d47acab666e4f2d5eb0c19d
Mirasys DVMS Workstation versions 5.12.6 and below suffer from a path traversal vulnerability.
276399a7dae0018cdefcd90802c9ecfcd7094d1a8afa4eed20c96841f110911b
Dell EMC RecoverPoint versions prior to 5.1.2 suffer from a remote root command execution vulnerability.
b3959182a01a1aa9519f51835810ba1223553cdd3266080ea2086fb66b9d35d5
FreeBSD Security Advisory - A subset of Intel processors can allow a local thread to infer data from another thread through a speculative execution side channel when Lazy FPU state restore is used. Any local thread can potentially read FPU state information from other threads running on the host. This could include cryptographic keys when the AES-NI CPU feature is present.
bbc335e62d9fb843edc9e54c223a5d3d9662b7778c54fc3d4e4e9662fe4d3afa
Opencart versions 3.0.2.0 and below suffer from a google_sitemap remote denial of service vulnerability.
4bcb11866439437a152baef9778aa9a5bf734c12c458b1c3546efdca87b8e168
ntp version 4.2.8p11 local buffer overflow proof of concept exploit.
58d5c2c09ae2ac283406b95eb42578ca0e011963836a1df819f9e248cdc7984b
VideoInsight WebClient version 5 suffers from a remote SQL injection vulnerability.
9907f69768133f69c06803d85d78103cab370c48d29f7950a6b06091abb211c9
Redis version 5.0 suffers from a denial of service vulnerability.
b9083d6a3754d8b70668b2647c1527f54eb1ff6f6c59aab67e247696efd33b11
MaDDash version 2.0.2 suffers from a directory listing disclosure vulnerability.
86348794655ae19dc86ddba6ebfe73f8999ff9be39d3b7532ad22ccd8050fa97
Slackware Security Advisory - New gnupg packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
527978ed4a1118975c628678ef407d626092edebb007c69f960a688a6649e7af
Debian Linux Security Advisory 4232-1 - This update provides mitigations for the "lazy FPU" vulnerability affecting a range of Intel CPUs, which could result in leaking CPU register states belonging to another vCPU previously scheduled on the same CPU.
ecd7deca21d0686873a63c4503fef255e8192dbf5a7c7f582012727ce32d5451
Red Hat Security Advisory 2018-1954-01 - GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system. Issues addressed include an access control issue.
4694bbb79e047c677cb14f89d98aa40b564882a3fdf2304df93962e0c63a1a02
Red Hat Security Advisory 2018-1955-01 - GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system. Issues addressed include an access control issue.
8a91a5ccbd82515976a205855cf865c2508e8d7bd565b5a5f1b8d1629d3c8ad8
Ubuntu Security Notice 3690-1 - Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. This update provides the microcode updates for AMD 17H family processors required for the corresponding Linux kernel updates.
dbbc8dce79a5282b27fd3fb78d0efddf1ef858502146cec75d8be9335af01447
Malbait is a honeypot written in perl. It creates fake servers and supports both TCP and UDP protocols, either singly or in combination. It outputs in CSV format as well as giving more detailed text reports. You can serve fake Telnet, FTP, SMTP, POP3, HTTP, TR-69, IMAP, asciitime, systat and echo servers, as well as serving blank or random output.
b2a5e5f4099d997913c7d6ba4a2ddc6d239ed821741525eeaddd41a93f11d30e
Red Hat Security Advisory 2018-1957-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a code execution vulnerability.
c0ccd2c712ca6f64979bef634b0b2d12e09be3bcba785dab1cd5951dc3890edb
Red Hat Security Advisory 2018-1932-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. Issues addressed include buffer overflow and code execution vulnerabilities.
6e92fa4a1f8faa6cbbfe11a277ce8dde91c2e66563b8ac7239e71ab8260f24ad
Red Hat Security Advisory 2018-1927-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a bypass vulnerability.
9fee2fee4ce741ec158d6c6d377344294455aa99280340438629c30c41171488
Red Hat Security Advisory 2018-1877-01 - The System Security Services Daemon service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch and the Pluggable Authentication Modules interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. The ding-libs packages contain a set of libraries used by the System Security Services Daemon as well as other projects, and provide functions to manipulate file system path names, a hash table to manage storage and access time properties, a data type to collect data in a hierarchical structure, a dynamically growing, reference-counted array, and a library to process configuration files in initialization format into a library collection data structure . Issues addressed include an unsanitized input vulnerability.
c71225130bd3ab1c0a26635e211bffd670b8726cc8a92cc1f60dca7d398961cb
Red Hat Security Advisory 2018-1883-01 - Samba is an open-source implementation of the Server Message Block or Common Internet File System protocol, which allows PC-compatible machines to share files, printers, and other information. Issues addressed include a null pointer vulnerability.
8012e6113e8535d6b09d7c051bd545c0ae5179f584291b41b214ec31f2a9c08b
Red Hat Security Advisory 2018-1860-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Issues addressed include a null pointer vulnerability.
5fc351b819842f938d109d630b3b72013ddd2bd28059603ad23e2ee5f5e32e30
Red Hat Security Advisory 2018-1929-01 - The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. Issues addressed include a resource exhaustion vulnerability.
a22fcf91b1a25f0218b6cf05d957422e71b31f08cce0e0c611b3582aa4c39494
Red Hat Security Advisory 2018-1933-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 67.0.3396.87. Issues addressed include an out of bounds write vulnerability.
3f5a45020603be5902094fecf7e0b13c9294fa97da5f02fa3df728e440f1353d