Red Hat Security Advisory 2020-2103-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a null pointer vulnerability.
69685ae64b17508993819bf6c3821f813401d7c1dd2d06f0f0993fb31a955491
TylerTech Eagle version 2018.3.11 suffers from a remote code execution vulnerability.
966770ccb06e6f9e5ff875bbd6fc8578e03727384a0fee39d60912d09e63779b
Red Hat Security Advisory 2020-2102-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and privilege escalation vulnerabilities.
d01822cdefd2a8f7c8259298b15c20b0cf838de3b4b6e40ca1190fff779c9619
WordPress ChopSlider3 plugin version 3.4 suffers from a remote SQL injection vulnerability.
cfc7ba3799b36c678dc3edc35d0a5f83e09a6b543c87ba67384476ee4398aafa
Red Hat Security Advisory 2020-2104-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include denial of service, double free, null pointer, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
55f2ffea99360d36e4e47e4a4596c9101c111085b9c05e6e7bde118e57a5e0ee
Orchard Core version RC1 suffers from a persistent cross site scripting vulnerability.
72a8a68f1801a2b8f14ac871496aa71b35ce4dcde4dcdf45516856143cc7c333
Chrome suffers from a Typer::Visitor::TypeInductionVariablePhi type inference issue.
97541b515f1146557567913a8db64be5813d2b15b948ea1105c9e3337c28233a
Red Hat Security Advisory 2020-2070-01 - Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network. Issues addressed include a denial of service vulnerability.
70f21663e5e831298ce08e4ecc72164810a7e8380b819136d821e2833c2960fd
Red Hat Security Advisory 2020-2071-01 - Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network. Issues addressed include a denial of service vulnerability.
8a031e6a20174bfab878d780d2dcd91a130378b07acf8c889ede98af694bb085
Red Hat Security Advisory 2020-2069-01 - Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network. Issues addressed include a denial of service vulnerability.
8acb0e0342a66015a473d60f71fcea3c3dc9c896053f19c2c00f62e5f565130f
Red Hat Security Advisory 2020-2009-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include an information leakage vulnerability.
9387f5ec97eb89aebf1ef451fd71587ad710d59e221b53717aba2ba790c703a1
Red Hat Security Advisory 2020-2065-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include a buffer overflow vulnerability.
c6cabd2eaa9e5ca317d292b44783e01523110994bf707faa88e49e927c5d2d59
Red Hat Security Advisory 2020-2064-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 81.0.4044.138. Issues addressed include a buffer overflow vulnerability.
7916576b415ec0ecf86c87bf19706b6dc4926c8c491c5bd2f60f13fc5d94d2db
MikroTik RouterOS suffers from two vulnerabilities. The cerm process suffers from an uncontrolled resource consumption issue. By sending a crafted packet, an authenticated remote user can cause a high cpu load, which may make the device respond slowly or unable to respond. Versions until stable 6.45.7 are affected. The traceroute process suffers from a memory corruption issue. By sending a crafted packet, an authenticated remote user can crash the traceroute process due to invalid memory access. Versions until stable 6.46.4 are affected.
77175816ac4a79fca801187367574009b954279dd3a15515035cbab28819403d