Gentoo Linux Security Advisory 202305-37 - Multiple vulnerabilities have been found in Apache Tomcat, the worst of which could result in denial of service. Versions greater than or equal to 10.1.8 are affected.
45f3055dd1212611c490b5967696d349bbbf06ab3a8ea9c9ee46bb2a72175964
Gentoo Linux Security Advisory 202305-31 - Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in arbitrary code execution. Versions greater than or equal to 4.5.0-r2 are affected.
99f970f1c540787e1b6a51df40cd754c93e89b443a65e3de70a4660cfd8b8c9c
Gentoo Linux Security Advisory 202305-34 - Multiple vulnerabilities have been found in CGAL, the worst of which could result in arbitrary code execution. Versions greater than or equal to 5.4.1 are affected.
04627ea9b87494af5f569efe441ac91ff58bffae741404d2996d314a69e5f0f8
Apple Security Advisory 2023-05-18-2 - iOS 15.7.6 and iPadOS 15.7.6 addresses buffer overflow, bypass, code execution, out of bounds read, and use-after-free vulnerabilities.
65a6495ca896d66d4bf5e2b01f2e21624f5f04735f435726663f7d12da055c95
Gentoo Linux Security Advisory 202305-36 - Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. Versions greater than or equal to 102.10.0 are affected.
cf32af8db7f48a44b2fe2d1424fd1ad7ec5f57e5c79d44dd0561f7d2a05b5ea4
Apple Security Advisory 2023-05-18-7 - watchOS 9.5 addresses buffer overflow, bypass, code execution, out of bounds read, and use-after-free vulnerabilities.
b44aa0d12fa7c7a09a8f9956e2818749eaebcb770aa44af77bf44e351004cdc8
Gentoo Linux Security Advisory 202305-29 - Multiple vulnerabilities have been discovered in squashfs-tools, the worst of which can result in an arbitrary file write. Versions greater than or equal to 4.5_p20210914 are affected.
41d12184d7c1d9e0b9fa6af6edbc6e9856d3a69d307703dd95cbde672592e475
Gentoo Linux Security Advisory 202305-30 - Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution. Versions greater than or equal to 21.1.8 are affected.
17ea79dd6032266e7320314c13626d60dbbcad16b92d154c8357ae278fff0d4c
Apple Security Advisory 2023-05-18-8 - Safari 16.5 addresses buffer overflow, code execution, out of bounds read, and use-after-free vulnerabilities.
760d4b141490199d056c3e2fd5a33bfe2577cd0555f9509afc40faff26728f2e
Apple Security Advisory 2023-05-18-6 - tvOS 16.5 addresses buffer overflow, bypass, code execution, out of bounds read, and use-after-free vulnerabilities.
44a1af95a4fc51116f9e4b81973b98a5f6c703a432867e64fcd364e999f2763a
Apple Security Advisory 2023-05-18-5 - macOS Big Sur 11.7.7 addresses buffer overflow, bypass, code execution, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
b58912e8acf591f66260299bd3c1b39b5bc5c222d4e36325272cb34f833aaec6
Apple Security Advisory 2023-05-18-4 - macOS Monterey 12.6.6 addresses buffer overflow, bypass, code execution, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
644baf02fffacd3bfa08aff764ca48c180719782e4b3ad431ea51c55f0ae9dd0
Apple Security Advisory 2023-05-18-3 - macOS Ventura 13.4 addresses buffer overflow, bypass, code execution, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
8e33867d17474c18e17fc09dff5dc2793c13d12ab78452d54966903cc65d99c0
Apple Security Advisory 2023-05-18-1 - iOS 16.5 and iPadOS 16.5 addresses buffer overflow, bypass, code execution, out of bounds read, and use-after-free vulnerabilities.
8d256948b5c37dbf667c61fb35ff92ba987737bb19205c0caef689de0a47f764
Ubuntu Security Notice 6112-1 - It was discovered that Perl was not properly verifying TLS certificates when using CPAN together with HTTP::Tiny to download modules over HTTPS. If a remote attacker were able to intercept communications, this flaw could potentially be used to install altered modules.
2cf6be1799272567464ae27a04638f2c3ef401074d8a57989082ac295dc2119b
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide. The 3.1.x series is the current major version of OpenSSL.
b3aa61334233b852b63ddb048df181177c2c659eb9d4376008118f9c08d07674
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.
eb1ab04781474360f77c318ab89d8c5a03abc38e63d65a603cabbf1b00a1dc90
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide.
e2f8d84b523eecd06c7be7626830370300fbcc15386bf5142d72758f6963ebc6
Argon Dashboard version 2 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
32a956d572822e0a978da64f79d5f04eeca8f803b2527b3aff2a8965883281a1
Thai Auto Web version 1.2 appears to be missing authentication on the administrative interface.
65ba5e262444c0c8b2ecfeaea7f263429fb1f32b786d76c0e7dd8ff518ed66f3
Code-Bakers version 1.0 appears to be missing authentication on the administrative interface.
37decde4e6e8203ecc07eae2804c9e5a9355e2f8ad34bd2e1301db2e84180c92
OpenSSL Security Advisory 20230530 - Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a denial of service.
b6e55e05830de14ac3c49c8cd590cf768a53232601f6b368a7e7f5592107d724