Debian Linux Security Advisory 4437-1 - It was discovered that a buffer overflow in the RTSP parser of the GStreamer media framework may result in the execution of arbitrary code if a malformed RSTP stream is opened.
bc8a622611b63e97247b96fb5c74154f4653d1a8a7fb4a49421109c5cd1b1448
Revive Adserver versions prior to 4.2.0 suffers from deserialization and open redirection vulnerabilities.
78026c25e3a914b02abb72a3cdb24b90933a9d60bd9adec3c0931a7bb0710202
Ubuntu Security Notice 3959-1 - It was discovered that Evince incorrectly handled certain images. An attacker could possibly use this issue to expose sensitive information.
669dda614f5b4d31dcae47c97ea37086595e9048aaeae96cd72e4b56af7910f3
Linux suffers from a missing locking between ELF coredump code and userfaultfd VMA modification.
673a7d5b5c8c34c1c31d9a3eff1b04dbcf78b701cc9cca3e53ef0c155170313f
Debian Linux Security Advisory 4435-1 - A use-after-free vulnerability was discovered in the png_image_free() function in the libpng PNG library, which could lead to denial of service or potentially the execution of arbitrary code if a malformed image is processed.
df28c2b8fc806792950ef320b38b24112132d25d54ec04f8f3aee39e69995fc1
Red Hat Security Advisory 2019-0902-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include an information leakage vulnerability.
90195f168793e06b9ef0967c605d9f9f6f6e3901ed207e9aae55bb2357627299
Debian Linux Security Advisory 4436-1 - problems and missing or incomplete input sanitizing may result in denial of service, memory disclosure or the execution of arbitrary code if malformed TIFF or Postscript files are processed.
525bc559decb02a259f43ff4c1088a37825ad9c868630219ca313aa43aee104c
This Metasploit module will execute an arbitrary payload on an "ESEL" server used by the AIS logistic software. The server typically listens on port 5099 without TLS. There could also be server listening on 5100 with TLS but the port 5099 is usually always open. The login process is vulnerable to an SQL Injection. Usually a MSSQL Server with the 'sa' user is in place. This module was verified on version 67 but it should also run on lower versions. An fixed version was created by AIS in September 2017. However most systems have not been updated. In regard to the payload, unless there is a closed port in the web server, you dont want to use any "bind" payload. You want a "reverse" payload, probably to your port 80 or to any other outbound port allowed on the firewall. Currently, one delivery method is supported This method takes advantage of the Command Stager subsystem. This allows using various techniques, such as using a TFTP server, to send the executable. By default the Command Stager uses 'wcsript.exe' to generate the executable on the target. NOTE: This module will leave a payload executable on the target system when the attack is finished.
4e45fd56c2526e9ec010441d375b5776dbcf5a8819b5ef299ef6e3dc30fd9290
This Metasploit module creates a pre-invoke hook for APT in apt.conf.d. The hook name syntax is numeric followed by text.
1f668b2326d929a2db35db36bbceabf75db247b88b34a713c1e9a1f6b200a8b6
Ubuntu Security Notice 3958-1 - It was discovered that GStreamer Base Plugins did not correctly handle certain malformed RTSP streams. If a user were tricked into opening a crafted RTSP stream with a GStreamer application, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code.
30a531e6b3c61b8b33c9f33b0cf3f8999309865d93c6e054ffba3ec781e2c5d0
This Metasploit module exploits a PHP unserialize() in Pimcore before 5.7.1 to execute arbitrary code. An authenticated user with "classes" permission could exploit the vulnerability. The vulnerability exists in the "ClassController.php" class, where the "bulk-commit" method makes it possible to exploit the unserialize function when passing untrusted values in "data" parameter. Tested on Pimcore 5.4.0-5.4.4, 5.5.1-5.5.4, 5.6.0-5.6.6 with the Symfony unserialize payload. Tested on Pimcore 4.0.0-4.6.5 with the Zend unserialize payload.
e9668485fecf0de5fb772aff42ff232d1d7e80b39adcab869e40e189d37c4459
Ubuntu Security Notice 3957-1 - Multiple security issues were discovered in MySQL and this update includes a new upstream MySQL version to fix these issues. Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04 have been updated to MySQL 5.7.26. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
fd6da06d0b5fcdab5ffdf9a225f950455852d3694d5de517d73e8563af33caa6
Slackware Security Advisory - New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.
ea217cab2b85ff9222a103d60a3ecf77601ae00ad9c3ce3f302f6a3eacc53cba
Agent Tesla Botnet suffers from an information leakage vulnerability.
fd014055fa6ce33f17efd4fe44c1b1487fb9df59b699edd8a675f4e98e75d9b5
Joomla JiFile component version 2.3.1 suffers from an arbitrary file download vulnerability.
43201465a4ea1bb274530efb807aa3c77218a0bc672acbfb481b82d4406ee4b4