Gentoo Linux Security Advisory 202003-58 - Multiple vulnerabilities have been found in UnZip, the worst of which could result in the execution of arbitrary code. Versions less than 6.0_p25 are affected.
92611270e60a22117296bbbc344ae4392ba44f64f14e73162c90724d0b0350cc
Gentoo Linux Security Advisory 202003-57 - Multiple vulnerabilities have been found in PHP, the worst of which could result in the execution of arbitrary shell commands. Versions less than 7.4.4 are affected.
a0c79fe9ba0d351c734220b280bb4f2ef495f58b8f6283805ea9e702e093c985
VLC for iOS was vulnerable to an unauthenticated insecure direct object reference vulnerability allowing for an attacker to compromise media. This issue was patched in the March, 2020 release.
659914d9efc7ff4458622d27c5cf28ce29be80b5ebb58157129b4c7297c0d139
Jinfornet Jreport version 15.6 suffers from an unauthenticated directory traversal vulnerability.
7f1115d2ff0c58a48fbab34dd63f82c48ea7a10f0a6a907b670f9beb78aa1d49
Easy RM to MP3 Converter version 2.7.3.700 suffers from an Input local buffer overflow vulnerability.
ff10bf0a3d592a7784969de5500cd5f300dd957d008f19d6f5f5116181473309
WordPress StatTraq plugin versions 1.3.0 and below suffer from a remote SQL injection vulnerability.
43f50708039f1c6603c892e980eae6791abd0b516194e21ac251cecf59554d1e
Soluzione Globale Ecommerce CMS version 1 suffers from a remote SQL injection vulnerability.
dc1f595b057aa3b7c5314b2d328d8e39ab21b58bb92f531e48d79b3196b8e4ef
This Metasploit module exploits a vulnerability within SharePoint and its .NET backend that allows an attacker to execute commands using specially crafted XOML data sent to SharePoint via the Workflows functionality.
583c7dc9e2c88b3f3622ee79ae7bc09a2e63d8641d172496c3143a024bc22425
Linux kernel versions starting at 4.10 and below 5.1.7 PTRACE_TRACEME local root exploit that uses the pkexec technique.
e7f854bf4bfbbd6ef656848e475779ed5d37f0342d90b357fbfff5954374bb40
nullscan is a modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs corresponding modules and their nullscan-tools afterwards. It can also take hosts and start nmap first in order to perform a basic portscan and run the modules afterwards. Also, nullscan can parse a given nmap logfile for open tcp and udp ports and again run the modules afterwards. All results will be logged in specified directories with a clean structure and an HTML report can subsequently be generated.
1da37356f0e6207cb790e560e1a98270c3634a6f5b57a81d9d96288dc9cb5be2
TP-Link Archer C50 V3 devices before build 200318 release 62209 allow remote attackers to cause a denial of service condition via a crafted HTTP Header containing an unexpected Referer field.
378a49e6c552f29a2bdfb6c0da0141a36b2f87302eae9f5b49385f85650833c7
Red Hat Security Advisory 2020-0980-01 - PostgreSQL is an advanced object-relational database management system. Issues addressed include a buffer overflow vulnerability.
3273a3aa9f488f9a6122b127bd2f71fa694f8305da572bdc3bf4752bfcb5a7c3
Red Hat Security Advisory 2020-0979-01 - The ipmitool packages contain a command-line utility for interfacing with devices that support the Intelligent Platform Management Interface specification. IPMI is an open standard for machine health, inventory, and remote power control. Issues addressed include a buffer overflow vulnerability.
5f005fb3d9d51b8389c3049648809457d03dd104b2c0cb9cd2bf39d30d10b391
Red Hat Security Advisory 2020-0978-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed.
2ebf88140942d0891466bcefc1a3814454846f389200f359eaaee3bc6783b795
Red Hat Security Advisory 2020-0830-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An issue was resolved where /etc/passwd was given incorrect privileges.
0eaf39dd07a5017d124e71468f11d4ebc5fe15b13c0d93f31c3260609d8e1b51
Red Hat Security Advisory 2020-0964-01 - Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Issues addressed include code execution and deserialization vulnerabilities.
0bbc6d0b1340b9e1e77661f6fd3104f23b4bfa6e941e551e8c264a9869530430
Red Hat Security Advisory 2020-0975-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. An issue was addressed where kiali had the JWT cookie using a default signing key.
981e31ca881033119e43bb090b5aea6ad3d5c8e3151443271a3f82e889849d5d
Gentoo Linux Security Advisory 202003-56 - Multiple vulnerabilities have been found in Xen, the worst of which could allow for privilege escalation. Versions less than 4.12.0-r1 are affected.
7959dee17cd4227918a51fda5daa8418f726f545d628a763b80ddbb67566d1eb
Gentoo Linux Security Advisory 202003-55 - A vulnerability in Zsh might allow an attacker to escalate privileges. Versions less than 5.8 are affected.
0f7abe1bc63f07bfd3eb85a3fb76160fbcca4bef6f4f71996af6fd2971dc9bd5
Red Hat Security Advisory 2020-0972-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
0c19a7199d6218eb62f062d1f8ade1bfbe2f37c61c688a8aab120737eef99f31
Gentoo Linux Security Advisory 202003-54 - Multiple vulnerabilities have been found in Pure-FTPd, the worst of which could allow remote attackers to cause a Denial of Service condition. Versions less than 1.0.49-r2 are affected.
03a17ed08e74c6de611d02ad78c3b4782dc5362e5813d972a63dd5d1bfb2dff6
Gentoo Linux Security Advisory 202003-53 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could allow remote attackers to execute arbitrary code. Versions less than 80.0.3987.149 are affected.
2a480cb669937d1c725c4aef6a3315f749e435c1409951d6da26173fa50e88bf
Gentoo Linux Security Advisory 202003-52 - Multiple vulnerabilities have been found in Samba, the worst of which could lead to remote code execution. Versions less than 4.11.6 are affected.
78ecd3bc02b0f10129021084736ee7cc0c9408898c589745d90193370efe75aa
Gentoo Linux Security Advisory 202003-51 - Multiple vulnerabilities have been found in WeeChat, the worst of which could allow remote attackers to cause a Denial of Service condition. Versions less than 2.7.1 are affected.
f767563f45dfcbcf074efa97a576793d3560569f28388db09faf91a7bace8a5a
Gentoo Linux Security Advisory 202003-50 - Multiple vulnerabilities were found in Tor, the worst of which could allow remote attackers to cause a Denial of Service condition. Versions less than 0.4.2.7 are affected.
241c5c76e2d1c5739286959f9935cd5faa7214265175db8ac1d957737034f95d