Red Hat Security Advisory 2018-0275-01 - The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services Elastic Compute Cloud. With this update, the jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.19. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
0b6591294016cd36d2f3ab83651a5348da0cd13f5c4199ff79a451daa7674878
Student Profile Management System Script version 2.0.6 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
6031dca0d014a869ffec25c315677bcb76912f6719888e1d79ff1f72ad15440a
Joomla! jLike component version 1.0 suffers from an information leak vulnerability.
742375e30a895406d4ebdba814c61801ae1f3bf7975c6929c116a42c267d7c80
Matrimonial Website Script version 2.1.6 suffers from a remote SQL injection vulnerability.
a01de0b17cccad609e43398fd52434acb2dba60e260c7e8a5a62abdfaaa4b02e
Online Voting System suffers from an authentication bypass vulnerability.
32bfcb8224fb52f3fbb509c8e16502cf41da748fe866cf0036fb1d382fbbd2fb
Wonder CMS version 2.3.1 suffers from a host header injection vulnerability.
24cf3ca97972685375e395666e1a24b8fbe2b66e0b38c7dce0b10b37dd7d6556
NixCMS version 1.0 suffers from a remote SQL injection vulnerability.
936ebff981bf4db6eb8f3904fec542284632d9dc6bb59516478db83e1c9ad1f7
Ubuntu Security Notice 3557-1 - Mathias Fischer discovered that Squid incorrectly handled certain long strings in headers. A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. William Lima discovered that Squid incorrectly handled XML parsing when processing Edge Side Includes. A malicious remote server could possibly cause Squid to crash, resulting in a denial of service. This issue was only addressed in Ubuntu 16.04 LTS. Various other issues were also addressed.
b169b09181988235b7219070211a4eb39cb8db8a12d583c3e7373490239320ac
Red Hat Security Advisory 2018-0273-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Multiple security issues have been addressed.
9b3ce16b4c52c0bc85663b6b2ca0f002b0a87d09953b621ce5c5048fe664f72a
BOCHS version 2.6-5 suffers from a local buffer overflow vulnerability.
3c3447ca69839ae3d2695c66f85d482432a3d8c25f093d5c311d016a03b6693c
Red Hat Security Advisory 2018-0270-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
55f6e618c39ded36286188ab30f1ce084d3cde4625686571fd4f7c2360c498c1
Red Hat Security Advisory 2018-0271-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
64dad27b4be16f54f1b1469d65627e74e595dde876b807bbb780c814da98546d
Wonder CMS version 2.3.1 suffers from an unrestricted file upload vulnerability.
41511ee7632b6c5884bead0d4c09ef9a499d4362850017952dbbe88f84cbceef
Red Hat Security Advisory 2018-0268-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
f715120595ee79831f6b7a47a44e3de317657aa6467cb89a1c791dad3262cf06
WordPress Core suffers from a load-scripts.php denial of service vulnerability.
90ddb66c987de35f176ec117059c00459eaf78cbd14c3774555863f298085f05
Red Hat Security Advisory 2018-0269-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
f5802dffb21f36902f8c60f225cbce9be3a8311276de9a89fe98ffd3e79c8efc