Gentoo Linux Security Advisory 202006-17 - Multiple vulnerabilities have been found in FAAD2, the worst of which could result in the arbitrary execution of code. Versions less than 2.9.0 are affected.
878df78e0a798faf10f09254187ebdeb6fd7f3af576029bcddb657f73d18c41f
Gentoo Linux Security Advisory 202006-16 - A vulnerability in PCRE2 could lead to a Denial of Service condition. Versions less than 10.34 are affected.
57da0d9204af8a43fb45c4739f71349910a036ba3b401093fa100f72812d7054
Gentoo Linux Security Advisory 202006-15 - Multiple vulnerabilities have been found in OpenConnect, the worst of which could result in the arbitrary execution of code. Versions less than 8.09-r1 are affected.
89d6386934e98e0fbbf58b1eba2ef8eb7a61c1a1ae0b5fc8ea15dd0afc0153ed
Gentoo Linux Security Advisory 202006-14 - A buffer overflow in the PEAR module Archive_Tar might allow local or remote attacker(s) to execute arbitrary code. Versions below 1.4.5 are affected.
64f72cb7244e378c12f60f38642177b264964ab70212fd0dd3a599d6d481054d
This Metasploit module will send arbitrary file_paths to the GOG GalaxyClientService, which will be executed with SYSTEM privileges (verified on GOG Galaxy Client v1.2.62 and v2.0.12; prior versions are also likely affected).
838d647668cc088d77656589096800f2021592f3069d7864d56f5dacf3b71773
Gentoo Linux Security Advisory 202006-13 - Multiple vulnerabilities have been found in json-c, the worst of which could result in a Denial of Service condition. Versions less than 0.14-r3 are affected.
2d8a86b8fefdac05b90ebe6e85d8e1402912572c5fa9627a3cda991a1a1da182
Red Hat Security Advisory 2020-2563-01 - Red Hat JBoss Enterprise Application Platform CD14 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform CD14 includes bug fixes and enhancements.
d70d6e402a5e4cf52a4af84952c0e3bef6f9470b117796bb7f27b8670402499b
Ubuntu Security Notice 4315-2 - USN-4315-1 fixed several vulnerabilities in Apport. This update provides the corresponding update for Ubuntu 14.04 ESM. Maximilien Bourgeteau discovered that the Apport lock file was created with insecure permissions. This could allow a local attacker to escalate their privileges via a symlink attack. Various other issues were also addressed.
7347091baf4ebd4bd549c2657d8611e56b9e6996a1c7a1589d41ade876fdb78b
Ubuntu Security Notice 4395-1 - Justin Steven discovered that fwupd incorrectly handled certain signature verification. An attacker could possibly use this issue to install an unsigned firmware.
e85a40d1b0aa2b09553ccc98b32e3f02f0ed60d15ea2a6884a5f9344d32e314b
Red Hat Security Advisory 2020-2549-01 - The libexif packages provide a library for extracting extra information from image files. Issues addressed include buffer over-read, denial of service, and information leakage vulnerabilities.
028688c6ead4e77c4a7acd3dfc04b52ed35c40bbbf82f23f8df36056b2ff7966
Red Hat Security Advisory 2020-2550-01 - The libexif packages provide a library for extracting extra information from image files. Issues addressed include buffer over-read, denial of service, and information leakage vulnerabilities.
c46c6d0f1dcdbb360f75c37131940778a3721d865fdf9f487dfb8d9a40f5b9d9
Red Hat Security Advisory 2020-2547-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 32.0.0.387. Issues addressed include a code execution vulnerability.
7f8260af84e444a4df084826d36427a6b3488e9f5f19fc78978d0f017fafc56e
PHP-Fusion version 9.03.60 PHP object injection to SQL injection pre-authentication exploit.
9499083374865e6afdcc98bbc3435e3e7b6d82a57f0a3486fba8428713cc05ed
102 bytes small Linux/x86 add map in /etc/hosts file polymorphic shellcode.
8c6be862cdd489e1e40cc44a7b3b8708d5796e21512c87f10dde7e74ba320238
Red Hat Security Advisory 2020-2544-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 83.0.4103.97. Issues addressed include a use-after-free vulnerability.
d25e875eecfd11989f704c4e1566be4adc973e56fbbb343e0a79b3afbe338ec2