Red Hat Security Advisory 2020-1543-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include information leakage and password leak vulnerabilities.
c52002c8b0c0474479293e105ec5d98f83b7c09d861560d312dc04aa0c422499
Red Hat Security Advisory 2020-1541-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include information leakage, password leak, and traversal vulnerabilities.
bafa80d198121580fa5362fb4f482bc1ea9851b9c4a5ce83e562156958360640
Red Hat Security Advisory 2020-1544-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include information leakage and password leak vulnerabilities.
9f34c5bfcfca954df28814893bd4a1a6b13bb45b32a7fda07bdf819cec68ac9b
Red Hat Security Advisory 2020-1542-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include information leakage, password leak, and traversal vulnerabilities.
081f0637174bb0bb026e380e73e882eaf6655807ad9be9a713654872ac5e68dc
Ubuntu Security Notice 4336-1 - It was discovered that GNU binutils contained a large number of security issues. If a user or automated system were tricked into processing a specially-crafted file, a remote attacker could cause GNU binutils to crash, resulting in a denial of service, or possibly execute arbitrary code.
e58de14e9fe7977815258d05ebf940b3f31230553e95ef56a4f46ed3ebcaaae3
Red Hat Security Advisory 2020-1538-01 - The release of Red Hat AMQ Online 1.4.1 serves as a replacement for AMQ online 1.4.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References.
4cadfe096f7f6cabf0c012002c7f0d349654ebf85096174d5bb3e82c814f3dac
Red Hat Security Advisory 2020-1515-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities.
2be8d16e091bb8a15aa035c763b50fce383d0dc21a7812f6626e5473bb2556de
Red Hat Security Advisory 2020-1516-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities.
4405a2534f9c8b1ec1f02b4afba1976fe36df9c0073447f0ad0997258bc5e64b
Red Hat Security Advisory 2020-1517-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include denial of service and deserialization vulnerabilities.
d0e82972c7732467e270e1ebda99b93aa9c47fa3de6e1eb562ee22da2f33d129
Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
41a4bb2e40bfe44868c18a795ecdfd11dab6d8bf8be3a6cd77946305ee8ef457
Red Hat Security Advisory 2020-1526-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a memory exhaustion vulnerability.
7b3d1329bc27382b6b1f979521b1a0307fea2821e3a6e7b97c6eb401a83ab3f3
Red Hat Security Advisory 2020-1527-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a memory exhaustion vulnerability.
22a92ba5d6bedb5473ded15c10f3b9e13aad46df7a86b23c101bfead6ff6e5d2
Ubuntu Security Notice 4335-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting attacks, or execute arbitrary code. Various other issues were also addressed.
5b0f96c8e531ef4c9797c7c8b829d69de481a70cc62c8097c6bd38d1c1677453
RM Downloader version 3.1.3.2.2010.06.13 suffers from a Load buffer overflow vulnerability.
0338fd680bc5cb7a0624c54dea1e7a5cc00da5200d97216dafdba8a74766f525
Edimax EW-7438RPn suffers from an information disclosure vulnerability.
c8c22cc5c10bb47e817efe60c88ccb7391c1afc6bcdb042bf068df7d167405cb
Edimax EW-7438RPn suffers from a cross site request forgery vulnerability.
5b6c72a2b2b1a5bd1001faf409af43b47231ddcdd91e41a35932e0ae46c48290