WebKit suffers from a WebCore::RenderLayer::updateDescendantDependentFlags use-after-free vulnerability.
bf315161b9d563fe58bae9997b294ab21d61b4e1889e5fe9e8d860999f22e0c1
WebKit suffers from a WebCore::SVGTextLayoutAttributes::context use-after-free vulnerability.
38fca191b8cfb11e205ef0cb59d6b9a5c606a64d85dd1580774a0a103a096acf
WebKit suffers from a WebCore::RenderTreeBuilder::removeAnonymousWrappersForInlineChildrenIfNeeded use-after-free vulnerability.
ad65916fee902cbf167e43363bef6f7f07016655ac1be18eb7fda7d1fb4722e7
Red Hat Security Advisory 2018-2785-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, denial of service, and use-after-free vulnerabilities.
a651adc265465e957f9312fcf269cdb464204f54b53754f01c8381d0017b8c0a
Red Hat Security Advisory 2018-2776-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, denial of service, and traversal vulnerabilities.
22994ea96c29c636784219b3ac43f2dc4724371757e8cc93ece30dd6a2fcb63f
Red Hat Security Advisory 2018-2790-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a denial of service vulnerability.
fb0ff027602e120f19038b71ba885ed38daa4a4a68d5029d1bdf47a814958bb2
Red Hat Security Advisory 2018-2791-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service and use-after-free vulnerabilities.
b7e4dcead8dbea8dbfa95be1837a0b2dfe5f8b4afad73943b53e7b3d8b930f48
Red Hat Security Advisory 2018-2789-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a denial of service vulnerability.
03600142228240af8cb5aa3ae7709d842f643a57f369623ba213a36315a98e14
Red Hat Security Advisory 2018-2768-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Issues addressed include a ClientHello issue with nss.
d60f75d418d1de32ebb20da317060c0d372fc15bfcfe685a16247f8fda85737b
Red Hat Security Advisory 2018-2763-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an integer overflow.
8a8017a298354d783ca92b38f20cd161f990b790585b9243060757f8dec68608
Red Hat Security Advisory 2018-2748-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an integer overflow.
2c686a3c397b11c1f30cf0c34ac0e021005e1fa7cec161de45165b0604820843
Red Hat Security Advisory 2018-2757-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include a denial of service vulnerability.
ebc2c485eac5e96a5ec19794c9c43a5b4e7aee4c30f1a0fff67a7a95a75f23cb
Red Hat Security Advisory 2018-2766-01 - Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Issues addressed include a sandbox escape.
70631d8462c12f3c73a064bb3a85f1aef61db4212294fa12c88dc7b994a3b712
Red Hat Security Advisory 2018-2762-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include a buffer overflow vulnerability.
209d50a103c543f6a233321f5bcf3334a56d4c697ddfd5141c793a182a440fc8
Red Hat Security Advisory 2018-2772-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include bypass and use-after-free vulnerabilities.
c125ecf3440cfb0740ae83cfcb2bd38eb8d9d8f0683c40c0eb58a70e71cdd1d5
Joomla! Timetable Schedule component version 3.6.8 suffers from a remote SQL injection vulnerability.
3f0a89e8ef4a0e1d3f1b385378d933fa2e703cae1c847ca797a5a4c475204922
Joomla! Article Factory Manager component version 4.3.9 suffers from a remote SQL injection vulnerability.
a1905eb0d006707d28faecde896ea012ff12d340229aa08898eb9db4775a93bc
Joomla! AlphaIndex Dictionaries component version 1.0 suffers from a remote SQL injection vulnerability.
241d6aab71bdcf890e17452ac758f4eab5586105f085c3226b733804e126b479
Joomla! Reverse Auction Factory component version 4.3.8 suffers from a remote SQL injection vulnerability.
284c13dde615ef73d72202c887a425b58f94e5dd80fda0eb7462a2e4fb9b2de8
Joomla! Collection Factory component version 4.1.9 suffers from a remote SQL injection vulnerability.
e5cc7e9af4d009cd137df751013b9dc9a9a2968ceb67bee95fd66ac023688ab2
Joomla! Swap Factory component version 2.2.1 suffers from a remote SQL injection vulnerability.
8c2e99ad10ea199a9fc95676bfa1a0e9fe33b7acaacd647e978e8e41ad6205be
Joomla eXtroForms component version 2.1.5 suffers from a remote SQL injection vulnerability.
3aa17d388a8eb8a88dfda1778a137f9b34b8142e5aa24cbe6f9f9b856cde9a20
Faleemi Desktop Software version 1.8.2 suffers from a buffer overflow vulnerability.
a8454a5d79f0395582da31250015d33c5ff93268440ceda003103fe004ce9287
Joomla! Dutch Auction Factory component version 2.0.2 suffers from a remote SQL injection vulnerability.
02abf4508718b3a1ef5999e458c1621763677710ab0073bc6cf8effe85d34f16
Joomla! Social Factory component version 3.8.3 suffers from a remote SQL injection vulnerability.
d4b0341b0a6905515efca4294889eeaa4be29c5b9e16a2f3bfbb0fa59bde2c40