Red Hat Security Advisory 2019-1163-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR5-FP35. Issues addressed include an out-of-bounds access vulnerability.
e8c30388c72687c5cbf62929d5e42d7569f6a9656326d4d1956f6ef95c1888cf
Red Hat Security Advisory 2019-1166-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR4-FP45. Issues addressed include an out-of-bounds access vulnerability.
25a28796ceb8baef140e9740a0e1ee4263d4e4a4853b84e58e3ca153c13f14e5
Ubuntu Security Notice 3976-1 - Isaac Boukris and Andrew Bartlett discovered that Samba incorrectly checked S4U2Self packets. In certain environments, a remote attacker could possibly use this issue to escalate privileges.
dd0a1a6394e8291ab9afd43a7fe9011256f9949be69dcaaa57db35a38fd62ecd
Schneider Electric U.Motion Builder version 1.3.4 suffers from an unauthenticated command injection vulnerability in track_import_export.php.
c724d066bedbb754af39373a9ad1f796ff21a6be3217d9b48ffbef558b5baceb
This Metasploit module exploits a command execution vulnerability in PHP-Fusion versions 9.03.00 and below. It is possible to execute commands in the system with ordinary user authority.
f3a52a3d14252043e24c4033fb9468a3f180a732dde81b0cd6a71ae559187ee5
PasteShr version 1.6 suffers from multiple remote SQL injection vulnerabilities.
223e039bf8223050dea38d457f9551e18c4c7e03bca181686f46f553a0b20a1a
Three different proof of concept exploits for TwistedBrush Pro Studio version 24.06 denial of service vulnerabilities.
b173f2175fe948adfa28d51440cad44d8387790d590f31b966f3c234f595e5d6
Red Hat Security Advisory 2019-1164-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR5-FP35. Issues addressed include an out-of-bounds access vulnerability.
34c844a1a2dfb06af1320b7e411354c4f6cb106ac4c2d3a110868c64368f15a8
Telenor.com.pk appears to allow an attacker set an arbitrary phone number for receiving an SMS for the second factor of authentication.
8604c3f0d31b2d0576055c5284067328ab79783fa81ecaea6f9791cb7d2f0d4f
An improper authentication vulnerability was identified in Banner Web Tailor and Banner Enterprise Identity Services. This vulnerability is produced when SSO Manager is used as the authentication mechanism for Web Tailor, where this could lead to information disclosure and loss of data integrity for the impacted user(s). The vendor has verified the vulnerability and produced a patch that is now available. Web Tailor versions 8.8.3, 8.8.4, and 8.9 are affected. Banner Enterprise Identity Services versions 8.3, 8.3.1, 8.3.2, and 8.4 are affected.
c5b89c0ff022b33f83d7e2c6516d55d205f56d56360478b890a7b5ee92107c73
Selfie Studio version 2.17 Resize Image denial of service proof of concept exploit.
0d82ed97401bf68acda4c2ce8345fc3c488b632c6d1e3e101752c9fc8cfe3644
Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
0ccae05e047471e8b1ed6a091dd3b4e6b030e3fc1373518466bec5b3e0af2161
Ubuntu Security Notice 3975-1 - It was discovered that the BigDecimal implementation in OpenJDK performed excessive computation when given certain values. An attacker could use this to cause a denial of service. Corwin de Boor and Robert Xiao discovered that the RMI registry implementation in OpenJDK did not properly select the correct skeleton class in some situations. An attacker could use this to possibly escape Java sandbox restrictions. Various other issues were also addressed.
863b426d41559bd65c2c7727e970150e9f9d551307f68fe80ad79c08db7ac719
Ubuntu Security Notice 3974-1 - It was discovered that VCFtools improperly handled certain input. If a user was tricked into opening a crafted input file, VCFtools could be made to crash.
23ab2fa35c204479e07557b6e1b96e52f006a95b1c20ce31a42ccbf95667bec2
Red Hat Security Advisory 2019-1162-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability.
c7d1940fd728b415f110e72909845b2271eb585cf3fe1c0022cb42c5baba4e0e
Red Hat Security Advisory 2019-1160-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability.
3a5c07b7f4dc0c1d0e83e80c108f16d7d04eb6c1b01ece3a5004980feb6ad6a1
Red Hat Security Advisory 2019-1161-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability.
de8411e9560c197b8de7528b762568e5f5c3aa978f3a5f13cf46e86c2003548d
Red Hat Security Advisory 2019-1159-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability.
53067ef42952a1e99d1aba18ee49ae76fe735209c653df2c3a7195c682804794
Apple Security Advisory 2019-5-13-5 - Safari 12.1.1 is now available and addresses code execution vulnerabilities.
b54753f3e49e40c5b74e853ebfd63d01063ffe26cb75989f0cd53099358b70d0
Apple Security Advisory 2019-5-13-6 - Apple TV Software 7.3 is now available and addresses buffer overflow and code execution vulnerabilities.
a0c2b59accf18608f95a5501c6124d5341631bfc4114448029f5a8933efb668a
Apple Security Advisory 2019-5-13-4 - watchOS 5.2.1 is now available and addresses code execution vulnerabilities.
5ed7262ba04a938e225a1c31b610b0f48f520ee2b68e8c4fd2ab497621f1fdd4
Apple Security Advisory 2019-5-13-3 - tvOS 12.3 is now available and addresses code execution vulnerabilities.
e28380f10c508e5d99835561276e3bf5e56b2672d8b17d6e8017303161413ab4
Apple Security Advisory 2019-5-13-2 - macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra are now available and addresses bypass and code execution vulnerabilities.
a7ec69641db07eba79fc8c8e1b9d137903fda5e0df296b6f25956e25c13bb712
Apple Security Advisory 2019-5-13-1 - iOS 12.3 is now available and addresses code execution vulnerabilities.
98f82c82387cbb5aa2121b69ad0c432e451a68e7b837a9bf0e4be86762e4853d