Security
Headlines
HeadlinesLatestCVEs

Tag

#linux

Red Hat Security Advisory 2023-1666-01

Red Hat Security Advisory 2023-1666-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Packet Storm
#vulnerability#linux#red_hat#rpm#sap
Debian Security Advisory 5383-1

Debian Linux Security Advisory 5383-1 - It was discovered that Ghostscript, the GPL PostScript/PDF interpreter, is prone to a buffer overflow vulnerability in the (T)BCP encoding filters, which could result in the execution of arbitrary code if malformed document files are processed (despite the -dSAFER sandbox being enabled).

Debian Security Advisory 5381-1

Debian Linux Security Advisory 5381-1 - Several security vulnerabilities have been discovered in the Tomcat servlet and JSP engine.

Debian Security Advisory 5382-1

Debian Linux Security Advisory 5382-1 - It was reported that cairosvg, a SVG converter based on Cairo, can send requests to external hosts when processing specially crafted SVG files with external file resource loading. An attacker can take advantage of this flaw to perform a server-side request forgery or denial of service. Fetching of external files is disabled by default with this update.

Universal Media Server 13.2.1 Cross Site Scripting

Universal Media Server version 13.2.1 suffers from a cross site scripting vulnerability.

Linux/x86_64 Bash Shellcode

71 bytes small Linux/x86_64 bash shellcode with XOR encoding.

flatnux 2021-03.25 Remote Code Execution

flatnux version 2021-03.25 suffers from a remote code execution vulnerability.

modoboa 2.0.4 Admin Takeover

modoboa version 2.0.4 suffers from an administrative takeover vulnerability.

POLR URL 2.3.0 Shortener Admin Takeover

POLR URL version 2.3.0 suffers from an administrative takeover vulnerability.

LDAP Tool Box Self Service Password 1.5.2 Account Takeover

LDAP Tool Box Self Service Password version 1.5.2 suffers from an account takeover vulnerability.