Red Hat Security Advisory 2020-1288-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability.
89719e6b81441f976dd3381193a1c7ab82863d5a4068e38baa0bcc2c20bca64d
Red Hat Security Advisory 2020-1290-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include an out of bounds write vulnerability.
8543e7b94677e15978de5119c6ea1bc027dd4b9630ee58bbf3947abb1242a170
AIDA64 Engineer version 6.20.5300 Report File filename SEH buffer overflow exploit.
fe7db04e0b5015baf2963e005ec2c8ca15943475775055a6ef16d357d909edb1
This whitepaper documents a walk through that describes the steps taken to identify a remote code execution vulnerability in multiOTP version 5.0.4.4.
4732ae6117764a5cac9dd84f3d79ef6065f0a8c5a22085a25d924acb3a87756e
MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities.
2e452f25b0aabc3741eb00b4ee2e86d5d200045527146eae962c28cf79d36776
Red Hat Security Advisory 2020-1289-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability.
43f7dbed2caec40c2917358ab5796636cad13980c6528820ebaf5c8d42ea78dc
Red Hat Security Advisory 2020-1300-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
3b3c803f11b4c41a45febe8388c0473da3dde22357cdfbf6ed410e72a987fcf3
Red Hat Security Advisory 2020-1296-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
582a06d1a570f22689b6e0e0554844dd019ec443602dd9afc0ae81f7061759a3
Red Hat Security Advisory 2020-1293-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include an integer overflow vulnerability.
df4b1d41f6c68e2a78690577c3494d3339b001d8baf303d5872c25c29dcd6eda
Red Hat Security Advisory 2020-1292-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
822a88fbde4ba430ccfe12abfad61ca2fa5862dcf015836281560a4ca8943b73
Ubuntu Security Notice 4315-1 - Maximilien Bourgeteau discovered that the Apport lock file was created with insecure permissions. This could allow a local attacker to escalate their privileges via a symlink attack. Maximilien Bourgeteau discovered a race condition in Apport when setting crash report permissions. This could allow a local attacker to read arbitrary files via a symlink attack.
d819c4efafca8506e3f245fcae9dc7047781ae3500f6f819a3a3741e775ed104
Gentoo Linux Security Advisory 202004-5 - Multiple vulnerabilities have been found in ledger, the worst of which could result in the arbitrary execution of code. Versions less than 3.1.2 are affected.
92a7a64a66bbe3d36df9adb6bcb9292019eeb3ecf20074f31f1d4a3d1e906355
Gentoo Linux Security Advisory 202004-4 - A heap use-after-free flaw in Qt WebEngine at worst might allow an attacker to execute arbitrary code. Versions less than 5.14.1 are affected.
7a52b5f7a7774575295d1f209b247ec0dd24851b3a42ade414cb6bdab9a8bd26
Gentoo Linux Security Advisory 202004-3 - Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in the execution of arbitrary code. Versions prior to 9.28_rc4 are affected.
1143a341a653ea77288aa928bf02cfdaeea19658c1e0c96e22d25a3ee29e8a6e
Gentoo Linux Security Advisory 202004-2 - Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox. Versions prior to 6.1.2 are affected.
9444c1cd65b0be3c66e10b50cd77081241f0982f0a67c43be5b83173de7238a9
Gentoo Linux Security Advisory 202004-1 - A vulnerability in HAProxy might lead to remote execution of arbitrary code. Versions less than 2.0.10 are affected.
fc7defad053a9d4d11667ab4c57e7a8e20e74a8eaf920d8e84d6936959d5dc30
Red Hat Security Advisory 2020-0933-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a memory exhaustion vulnerability.
977d069952fad168f2f02b273232651c897dafbc1e28809a0b4c7ba3b688b95d
Red Hat Security Advisory 2020-0934-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.
ecfb54ae160def1b02693ff1eff80d1e6c5eba5018a485d375c916b96d05c808
Oracle Coherence Fusion Middleware remote code execution exploit. Supported versions that are affected are 3.7.1.17, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0.
52dafdcd1d80de582519836e110883d5cb715ba29d27f9d1567b0b73106f9194
DiskBoss version 7.7.14 Input Directory local buffer overflow proof of concept exploit.
dccb7a29e4c3e003b3266f00e22e3712dd77ee73209caf9c41569d4536228b05