Gentoo Linux Security Advisory 202010-8 - Multiple vulnerabilities have been found in Mozilla Firefox and Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Versions less than 82.0 are affected.
d6f8ee617bc93a30faf7d5fad1b396758ce22538d413ac0e4661c2bb01acfc59
CSE Bookstore version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
22ade0807de506d719e10260a6706f161c23e19eabb44126ae5efb25be5761a3
Ubuntu Security Notice 4607-1 - It was discovered that OpenJDK incorrectly handled deserializing Proxy class objects with many interfaces. A remote attacker could possibly use this issue to cause a denial of service via a specially crafted input. Sergey Ostanin discovered that OpenJDK incorrectly restricted authentication mechanisms. A remote attacker could possibly use this issue to obtain sensitive information over an unencrypted connection. Various other issues were also addressed.
511d4e10ce236dd52aeb3cf636a58fa4bc77beae290a7b505ccd45dceb05dedb
Nagios XI version 5.7.3 mibs.php remote command injection exploit.
6855f4caf30f9e7751d6594a73e43b55ca31b7b9ddebeacdfa7108721c29da09
Ubuntu Security Notice 4603-1 - It was discovered that MariaDB didn't properly validate the content of a packet received from a server. A remote attacker could use this vulnerability to sent a specialy crafted file to cause a denial of service. It was discovered that MariaDB has other security issues. An attacker can cause a hang or frequently repeatable crash. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
0294356c27b1e6c2fe77a483a9758f2ed654d98df7f671f25e882fac606f9530
Ubuntu Security Notice 4600-2 - USN-4600-1 fixed multiple vunerabilities in Netty 3.9. This update provides the corresponding fixes for CVE-2019-20444, CVE-2019-20445 for Netty. Also it was discovered that Netty allow for unbounded memory allocation. A remote attacker could send a large stream to the Netty server causing it to crash. Various other issues were also addressed.
2743e423223a69bc2e5a3493c5262e8e506d7718197a2ac2bde20270a2a9ba90
Blueman versions prior to 2.1.4 suffer from a local privilege escalation vulnerability that achieves root.
ad12e1f52e4713a386324b965386aa1a9020999aa33360fe64eedb3b1faaaecf
aptdaemon versions prior to 1.1.1 suffer from a file existence disclosure vulnerability.
6a60467266f33dfd33dccd469d46b9f39048b554f67da424046c527d10d8c317
Ubuntu Security Notice 3081-2 - Dawid Golunski discovered that the Tomcat init script incorrectly handled creating log files. A remote attacker could possibly use this issue to obtain root privileges.
a5c9a3a9bdb78367603007ec8640aaab2dc3486f9c257dae7a0d8cdaa28cc548
PackageKit versions prior to 1.1.13 suffer from a file existence disclosure vulnerability.
c2cb1ba823e3746c7e8a7376f0d64634a3e8d0f82cd84d7bcaeca3c7d83f764c
Online Library Management System version 1.0 suffers from a remote shell upload vulnerability.
4da20cf09143b14a2750ade91ede9aa9d1031a15696f1cbe0745bd3f38554098
Point of Sales version 1.0 suffers from a remote SQL injection vulnerability.
14479cfedac75e0485e20fa319e6a41519d81d62f71e316b0d6e690a943c2987
Gym Management System version 1.0 suffers from multiple remote SQL injection vulnerabilities.
d9e14fc468e33947658caab1b00ebb95b4485be3fe34d24dce85dc4e303ca61a
Gym Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
b745d5a85f8d66a52474e9b1ce0d16a0ea6438196f210f2ee896be788ef23c20
EPSON version 1.124 suffers from an unquoted service path vulnerability.
77392f0312134ef5bd8f87e10e2d0438d4e6565420dd9f06a1b571289a14c923
Program Access Controller version 1.2.0.0 suffers from an unquoted service path vulnerability.
38d93b040d0c949a6298844741a4585801f07535c56d5185aedbcfb8a3a8e232
Prey version 1.9.6 suffers from an unquoted service path vulnerability.
43c2f1ddc67961bd69a8be2622988fde5ab1eda49d8f8cdba56ce41485449de1
IP Watcher version 3.0.0.30 suffers from an unquoted service path vulnerability.
155370a316d32e65107407972deb4367efe1bcc061e9387fc377cf727b252ba5