Debian Linux Security Advisory 3352-1 - A vulnerability was found in screen causing a stack overflow which results in crashing the screen server process, resulting in denial of service.
c616db71ec72d56730bd80e07c991d4776de42d1ef41754f9efb3577f8801eb7
Slackware Security Advisory - New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues.
325807d52d82ff0701dfafefc9dc56c655b0fc47110fead1686fb8f5521f0d6f
Debian Linux Security Advisory 3351-1 - Several vulnerabilities have been discovered in the chromium web browser.
6cca37472cf647cafbb73bd89b0010cba52f4ca5de3b365c1f5a4f612542bc9e
Red Hat Security Advisory 2015-1736-01 - Red Hat OpenShift Enterprise is a cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Improper error handling in the API server can cause the master process to crash. A user with network access to the master could cause this to happen. This issue was discovered by Jordan Liggitt of the Red Hat OpenShift Enterprise Team.
2857fbe01e89461d2a72c8ceff63a35365380e8abf2b27ec63226fb6309e4d96
Red Hat Security Advisory 2015-1723-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A denial of service flaw was found in the OpenStack Compute instance migration process. Because the migration process does not terminate when an instance is deleted, an authenticated user could bypass user quota and deplete all available disk space by repeatedly re-sizing and deleting an instance.
269739fb4eed0939a3fe5bb0e77cba50b89e6fbd83789e3bbbb4575bef7aba78
Red Hat Security Advisory 2015-1718-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.
a514586f1b51d5d9e067dd9bf8dadf1695ce5373f0003545703af0ed805743c4
This Metasploit module will install a payload that is executed during boot. It will be executed either at user logon or system startup via the registry value in "CurrentVersion\Run" (depending on privilege and selected method). The payload will be installed completely in registry.
41b0703a3928a8e079eb9c171583927b24819f1a2a9c5312653c3ebbad79ef30
This Metasploit module will bypass Windows UAC by utilizing the missing .manifest on the script host cscript/wscript.exe binaries.
6a2017090a1d8df299e19c2f05246d4fcd92fcba63db5b4f0d368934a069f10d
Ubuntu Security Notice 2733-1 - It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.
aed97bcce3bcdcd3378f8a5bfa453dbd5b835041f5e9598a783520715b55c720
Ubuntu Security Notice 2731-1 - Benjamin Randazzo discovered an information leak in the md (multiple device) driver when the bitmap_info.file is disabled. A local privileged attacker could use this to obtain sensitive information from the kernel.
24de15f1493c6e8ff0741238e4f6fad9f9643a4c34d66df965eb90be9e6d208c
Ubuntu Security Notice 2732-1 - Benjamin Randazzo discovered an information leak in the md (multiple device) driver when the bitmap_info.file is disabled. A local privileged attacker could use this to obtain sensitive information from the kernel.
87862b897221aa7dbd1dbce8cd61773ac51ef742543caa1e335e901a4834e577
Ubuntu Security Notice 2734-1 - It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.
933bd370db7100f6bdb941b0ce5f6c53c1e9f6afdafe2590b4d273047ddb2452
Multiple buffer overflow vulnerabilities have been identified in Yahoo! Messenger versions 11.5.0.228 and below.
9d26e574742a05e0d9ed0da0fc36fb791f73fe5d0fc5808ba608861876ba8aaf
EMC Documentum Content Server includes a privilege escalation vulnerability that could potentially be exploited by malicious, regular users to perform certain actions as the superuser. Unprivileged Content Server users may potentially escalate their privileges to become a superuser by creating and performing malicious operations on dm_job objects. This is due to improper authorization checks being performed on such objects and some of their attributes. The previous fix for CVE-2014-4626 was incomplete. Versions 7.2 and below are affected.
2b6562f6e59b15b849389a486f037ec353fdd61e11c4152b636cd4aa6c942310
Zhone ADSL2+ 4P Bridge bridge and router suffers from authentication bypass and information disclosure vulnerabilities.
36fffeae9e31ea29e72292db9fc439a39ab2bc503c6828a73ebe42ad76bdf9da
Avaya one-X Agent version 2.5 SP2 suffers from having a hard-coded key and various cryptography use issues.
bf140d213af14199a880bdd1f929e50c95c139713cf6105f06c8ac6b71462212
OpenDocMan version 1.3.2. suffers from a cross site scripting vulnerability.
f87e86cc7aa648b71918f17acbca3b4b1642384f56f726e37852d5364e6901bb
Milw0rm Clone Script version 1.0 suffers from a cross site scripting vulnerability.
d1276ed90e65a1b97fd5cb7294a51f4fcbefcba9158665a5f76c46ca445c989d
Virtual Freer versions prior to 1.57 suffers from an authentication bypass vulnerability.
51f0e25d1f80da430183b46bb1bdd85efedf4585a5509e247a6e9d52ba3fea41
Anontwi is a tool for OAuth2 applications, such as GNUSocial and Twitter, that provides different layers of encryption, privacy methods and proxy features. It contains a GTk+ interface.
64fe6a0c9014c5da22ce20c33e87789dfee179b6ba19224d24e83eef1c1e824c