exploit the possibilities
Showing 1 - 25 of 69,603 RSS Feed

Advisory Files

Red Hat Security Advisory 2019-0095-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0095-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Update Support for Red Hat Enterprise Linux 6.7 was retired as of December 31, 2018, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical Impact security patches or Urgent Priority bug fixes, for Red Hat Enterprise Linux 6.7 EUS after December 31, 2018.

tags | advisory
systems | linux, redhat
MD5 | 3158566d85c31f0dfc2d51ead425027d
Debian Security Advisory 4367-2
Posted Jan 17, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4367-2 - The Qualys Research Labs reported that the backported security fixes shipped in DSA 4367-1 contained a memory leak in systemd-journald. This and an unrelated bug in systemd-coredump are corrected in this update.

tags | advisory, memory leak
systems | linux, debian
MD5 | e6c45b7a762974159f1854d96b0e0726
Ubuntu Security Notice USN-3861-2
Posted Jan 17, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3861-2 - USN-3861-1 fixed a vulnerability in PolicyKit. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that PolicyKit incorrectly handled certain large user UIDs. A local attacker with a large UID could possibly use this issue to perform privileged actions. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2018-19788
MD5 | 1d929df08d738a1407781094c847f6a4
Red Hat Security Advisory 2019-0085-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0085-01 - The pyOpenSSL packages provide a high-level wrapper around a subset of the OpenSSL library for the Python programming language. Issues addressed include an use-after-free vulnerability.

tags | advisory, python
systems | linux, redhat
advisories | CVE-2018-1000807, CVE-2018-1000808
MD5 | fc1904589b76d6f60961dff1431eb327
Red Hat Security Advisory 2019-0081-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0081-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include buffer over-read and assertion failure vulnerabilities.

tags | advisory, remote, vulnerability, protocol
systems | linux, redhat
advisories | CVE-2018-17204, CVE-2018-17205, CVE-2018-17206
MD5 | a2ed20828f9bb99429f75d2467b1d25c
Red Hat Security Advisory 2019-0082-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0082-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. Issues addressed include a regular expression issue.

tags | advisory, web, python
systems | linux, redhat
advisories | CVE-2018-7536
MD5 | 9aa0bddb050fd4996d48b05ff173bb32
Red Hat Security Advisory 2019-0094-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0094-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2018-11218, CVE-2018-11219, CVE-2018-12326
MD5 | 0a8a34ac5fe8d795c162ea49204c9741
Red Hat Security Advisory 2019-0053-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0053-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include buffer over-read and assertion failure vulnerabilities.

tags | advisory, remote, vulnerability, protocol
systems | linux, redhat
advisories | CVE-2018-17204, CVE-2018-17205, CVE-2018-17206
MD5 | ba9d36b2c4f40fb7198b650a3984ebd7
Red Hat Security Advisory 2019-0054-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0054-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include code execution and information leakage vulnerabilities.

tags | advisory, remote, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2018-10855, CVE-2018-10874, CVE-2018-10875
MD5 | ce0ec5ec5a1a30a4008850c12fe6b6be
Red Hat Security Advisory 2019-0051-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0051-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. Issues addressed include a regular expression issue.

tags | advisory, web, python
systems | linux, redhat
advisories | CVE-2018-7536
MD5 | 47ab461091ffe607ecfd6328ea4fe8bf
Red Hat Security Advisory 2019-0052-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0052-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2018-11218, CVE-2018-11219, CVE-2018-12326
MD5 | 4ed5922b512c77f35fe4d1fa21fbdcef
Ubuntu Security Notice USN-3861-1
Posted Jan 17, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3861-1 - It was discovered that PolicyKit incorrectly handled certain large user UIDs. A local attacker with a large UID could possibly use this issue to perform privileged actions.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2018-19788
MD5 | a1e50592c0cb58f40bf65035005c7ba9
SCP Server Verification Issues
Posted Jan 16, 2019
Authored by Harry Sintonen

Many scp clients fail to verify if the objects returned by the scp server match those it asked for. This issue dates back to 1983 and rcp, on which scp is based. A separate flaw in the client allows the target directory attributes to be changed arbitrarily. Finally, two vulnerabilities in clients may allow server to spoof the client output.

tags | advisory, spoof, vulnerability
advisories | CVE-2000-0992, CVE-2018-20684, CVE-2018-20685, CVE-2019-6109, CVE-2019-6110, CVE-2019-6111
MD5 | d3b18a0146f2be70c357e933eb037d03
Ubuntu Security Notice USN-3860-1
Posted Jan 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3860-1 - It was discovered that libcaca incorrectly handled certain images. An attacker could possibly use this issue to cause a denial of service. It was discovered that libcaca incorrectly handled certain images. An attacker could possibly use this issue to execute arbitrary code. It was discovered that libcaca incorrectly handled certain images. An attacker could possibly use this issue to access sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2018-20544, CVE-2018-20548
MD5 | 0d22dd812ca9b3495b60878b292fe08a
Ubuntu Security Notice USN-3860-2
Posted Jan 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3860-2 - USN-3860-1 fixed a vulnerability in libcaca. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that libcaca incorrectly handled certain images. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2018-20544, CVE-2018-20548
MD5 | 08e443ad98b75a487a661c100ab97280
Ubuntu Security Notice USN-3859-1
Posted Jan 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3859-1 - It was discovered that libarchive incorrectly handled certain archive files. An attacker could possibly use this issue to cause a denial of service.CVE-2018-1000880 affected only Ubuntu 18.04 and Ubuntu 18.10 LTS. It was discovered that libarchive incorrectly handled certain archive files. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2017-14502
MD5 | e5c4c24eaa0041372b257aec38c032e0
Ubuntu Security Notice USN-3858-1
Posted Jan 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3858-1 - It was discovered that HAProxy incorrectly handled certain requests. An attacker could possibly use this to expose sensitive information. It was discovered that HAProxy incorrectly handled certain requests. A attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 18.10. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2018-20102
MD5 | 09c52c83ab2fdfedfa8403b297813de6
Red Hat Security Advisory 2019-0059-01
Posted Jan 15, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0059-01 - LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2018-15127
MD5 | a92366eae97b49f94841d75837489282
Debian Security Advisory 4369-1
Posted Jan 15, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4369-1 - Multiple vulnerabilities have been discovered in the Xen hypervisor.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2018-19961, CVE-2018-19962, CVE-2018-19965, CVE-2018-19966, CVE-2018-19967
MD5 | ab9b9c1cef656cea30c34fbb287babeb
Debian Security Advisory 4368-1
Posted Jan 15, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4368-1 - Guido Vranken discovered that an incorrect bounds check in ZeroMQ, a lightweight messaging kernel, could result in the execution of arbitrary code.

tags | advisory, arbitrary, kernel
systems | linux, debian
advisories | CVE-2019-6250
MD5 | d0ebb6a44e5eb5ba095db014dad1e17c
Ubuntu Security Notice USN-3857-1
Posted Jan 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3857-1 - Fariskhi Vidyan discovered that PEAR Archive_Tar incorrectly handled certain archive paths. A remote attacker could possibly use this issue to execute arbitrary code.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2018-1000888
MD5 | 0216917c7cb3ac850f31adf9b107774b
Ubuntu Security Notice USN-3856-1
Posted Jan 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3856-1 - Chris Marchesi discovered that BlueZ incorrectly handled disabling Bluetooth visibility. A remote attacker could possibly pair to devices, contrary to expectations. This update adds a workaround to GNOME Bluetooth to fix the issue.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2018-10910
MD5 | b7dfec4af097cb08bba630ac582166f6
Red Hat Security Advisory 2019-0049-01
Posted Jan 14, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0049-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include an out-of-bounds heap write and stack overflows.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2018-15688, CVE-2018-16864, CVE-2018-16865
MD5 | e4ea3d6803d2cce66a1c28ddcf5ee966
Slackware Security Advisory - zsh Updates
Posted Jan 14, 2019
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New zsh packages are available for Slackware 14.0, 14.1, and 14.2 to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2017-18205, CVE-2017-18206, CVE-2018-1071, CVE-2018-1083, CVE-2018-1100, CVE-2018-7548, CVE-2018-7549
MD5 | 002e6a9a93373c1f12e71b5f2b2ead7c
Debian Security Advisory 4367-1
Posted Jan 14, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4367-1 - The Qualys Research Labs discovered multiple vulnerabilities in systemd-journald. Two memory corruption flaws, via attacker-controlled alloca()s (CVE-2018-16864, CVE-2018-16865) and an out-of-bounds read flaw leading to an information leak (CVE-2018-16866), could allow an attacker to cause a denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2018-16864, CVE-2018-16865, CVE-2018-16866
MD5 | 52119bef744619b328f6429303d66914
Page 1 of 2,785
Back12345Next

File Archive:

January 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    15 Files
  • 2
    Jan 2nd
    15 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    1 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    24 Files
  • 8
    Jan 8th
    15 Files
  • 9
    Jan 9th
    16 Files
  • 10
    Jan 10th
    23 Files
  • 11
    Jan 11th
    17 Files
  • 12
    Jan 12th
    3 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    33 Files
  • 16
    Jan 16th
    23 Files
  • 17
    Jan 17th
    15 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close