Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
b691ea207bff2ee06c333130f2ec6190d8163ac74e91354a2997355db3db752a
FANUC Robotics Virtual Robot Controller version 8.23 suffers from a path traversal vulnerability.
451f052958031bcaa7d32e2a3eebd05d1fe15ad5d480d5caf7bb585a1ba75721
FANUC Robotics Virtual Robot Controller version 8.23 suffers from a stack-based buffer overflow vulnerability.
a5623f109ba65b003816746eb2a64c163616069d75285f9501dc30836a30321d
Red Hat Security Advisory 2019-1799-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.8.0. Issues addressed include cross site scripting and use-after-free vulnerabilities.
c12cee99bf0a65707b0961c6d9fd53170af421ed97528139f98de3e55740e01f
An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86.
b12d041b74805140215567e34bac24168770da5ed39aeeca4562c66332b7d517
Linux suffers from broken permission and object lifetime handling for PTRACE_TRACEME.
30dafcd01fe3416a51e40e4a4f49ab60f981e89f93b9635b6199d3e4fa21fde9
Microsoft compiled HTML Help and uncompiled .chm files can be leveraged for XML external entity injection attacks.
5b366b813a8e6548ff87d56be406a5be2af24d4545f6160220a89f13e26612be
Ubuntu Security Notice 4062-1 - Rohan Padhye discovered that WavPack incorrectly handled certain WAV files. An attacker could possibly use this issue to cause a denial of service.
63149ec0a596935be878ae55416c00233d588cf03817a399bab38944bf5b48b3
Ubuntu Security Notice 4060-2 - USN-4060-1 fixed several vulnerabilities in nss. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Henry Corrigan-Gibbs discovered that NSS incorrectly handled importing certain curve25519 private keys. An attacker could use this issue to cause NSS to crash, resulting in a denial of service, or possibly obtain sensitive information. Various other issues were also addressed.
dc404bec2be92aec8572c8e14075ea9973a755e99561a52a901d64fd45019358
Red Hat Security Advisory 2019-1797-01 - Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. This release of Red Hat JBoss BPM Suite 6.4.12 serves as a replacement for Red Hat JBoss BPM Suite 6.4.11, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution and deserialization vulnerabilities.
48ed6e1685f44f91f8d17d107b4e8cbd77921ca5a821642f761a77890d4c0a04
Ubuntu Security Notice 4061-1 - It was discovered that Redis incorrectly handled the hyperloglog data structure. An attacker could use this issue to cause Redis to crash, resulting in a denial of service, or possibly execute arbitrary code.
e6d62200dcc3583ff8990bfabdcea64710cac89e9b14e1053e57ec6615532b05
Red Hat Security Advisory 2019-1793-01 - Vim is an updated and improved version of the vi editor. Issues addressed include a command execution vulnerability.
413b028dec27318e4075de1290829b8593da63a5bebd9c3149ff2dd4b87783da
Red Hat Security Advisory 2019-1791-01 - The libssh2 packages provide a library that implements the SSH2 protocol. Issues addressed include an out of bounds write vulnerability.
ab453bfdfef8772fcad778b2d3e9d17c12720b23bf6235fb3b54576ce8ce5a03
Red Hat Security Advisory 2019-1792-01 - The keepalived utility provides simple and robust facilities for load balancing and high availability. The load balancing framework relies on the well-known and widely used IP Virtual Server kernel module providing layer-4 load balancing. Keepalived implements a set of checkers to dynamically and adaptively maintain and manage a load balanced server pool according to the health of the servers. Keepalived also implements the Virtual Router Redundancy Protocol to achieve high availability with director failover. Issues addressed include buffer overflow, code execution, and denial of service vulnerabilities.
e8b2c036abafa818c2cbe9af3f514c4d681f196630ae40f766f3fd9ae158e70d
Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.
f8cb5dc723172a0e5fdef1ecaaeb6bac246d86da717f44ccfdc0859dcabcafc0
Red Hat Security Advisory 2019-1789-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include a denial of service vulnerability.
ce8e302873dd5f02c9a76ef65d7d4604bfadf2b877ddffcd70edefdec9383aa9
Ubuntu Security Notice 4060-1 - Henry Corrigan-Gibbs discovered that NSS incorrectly handled importing certain curve25519 private keys. An attacker could use this issue to cause NSS to crash, resulting in a denial of service, or possibly obtain sensitive information. Hubert Kario discovered that NSS incorrectly handled PKCS#1 v1.5 signatures when using TLSv1.3. An attacker could possibly use this issue to trick NSS into using PKCS#1 v1.5 signatures, contrary to expectations. This issue only applied to Ubuntu 19.04. Various other issues were also addressed.
4833762dc1164d15b60629a20a5c4a0bde649c21804aa2733f5e4705fa96aa17
Red Hat Security Advisory 2019-1782-01 - Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This release of Red Hat JBoss BRMS 6.4.11 serves as a replacement for Red Hat JBoss BRMS 6.4.10, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution and deserialization vulnerabilities.
070014cab3f3866eef17e4d567567e996e21a92cd3bce3c6b0c21c3ae7e5c8de
Ubuntu Security Notice 4059-1 - It was discovered that Squid incorrectly handled certain SNMP packets. A remote attacker could possibly use this issue to cause memory consumption, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that Squid incorrectly handled the cachemgr.cgi web module. A remote attacker could possibly use this issue to conduct cross-site scripting attacks. Various other issues were also addressed.
c8c4c910610e5c8e2dd0704acd9d7a236239ea0494320f5de196638e2405ad2f
Ubuntu Security Notice 4058-1 - It was discovered that Bash incorrectly handled the restricted shell. An attacker could possibly use this issue to escape restrictions and execute any command.
c33bd8d129ccce9d7cbeb7c4e2f9efdfd541bd0c862ffb4ff5810ee260585dcb
CentOS Control Web Panel version 0.9.8.838 suffers from a user enumeration vulnerability.
b55ea54a095856957512695c02953fa262909e4b5e12d1708989b7bae539bd95
FRITZ!OS versions 6.83 and 6.80 (AVM DSL Router Fritz!Box 7490) suffer from an information leakage vulnerability.
7e49a29a0b39a62b8f87366f48db8190f98013776d9eacb961e3aaae614d98c9
CentOS Control Web Panel version 0.9.8.836 suffers from an authentication bypass vulnerability.
56140eff369b0e1d3f217bda727af43d8f0f5ceb66c1dcb4909cca19c89f6159
CentOS Control Web Panel version 0.9.8.836 suffers from a privilege escalation vulnerability.
6786ad452c534bb2d1a1aaaed04c6ae8ce8e9dea3946bcbb6f5b478fb4cac7ff
DameWare Remote Support version 12.0.0.509 Host SEH buffer overflow exploit.
1bd9814bcc27791b7acb6112fc23b9c277932299f262e94043c7265ab0f11aef