Debian Linux Security Advisory 5223-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
eaccf2c4f13785f27ea55d281296ec9a704251dbe2c16cc511b155f0d5dbc78f
Debian Linux Security Advisory 5224-1 - Two vulnerabilities were discovered in poppler, a PDF rendering library, which could result in denial of service or the execution of arbitrary code if a malformed PDF file or JBIG2 image is processed.
fff5c555e685acd923ce1cd2043a40d9c2db36d0eed0627070038e954e24e95c
Debian Linux Security Advisory 5225-1 - A security issue was discovered in Chromium, which could result in the execution of arbitrary code.
98a8f68e6eeb765491847e5b3440d501a6818cac4dc84af5724f091a2bc33174
Debian Linux Security Advisory 5226-1 - Two security issues were discovered in pcs, a corosync and pacemaker configuration tool.
6063675b6309f8ba39ab444e7fce5c743b477418ff598c15909fc9e571447b45
Debian Linux Security Advisory 5227-1 - It was discovered that Gson, a Java library that can be used to convert Java Objects into their JSON representations and vice versa, was vulnerable to a de- serialization flaw. An application would de-serialize untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution. This can lead to a denial of service or even the execution of arbitrary code.
b6af2512c97e2e986859b67b105cb3eb62cba8bf639bf250fd2d00129989f97f
Debian Linux Security Advisory 5228-1 - Several vulnerabilities were discovered in gdk-pixbuf, the GDK Pixbuf library.
2779b19645046756f046040b839f7910204298a4f8304bb68cd29482f89ab133
Debian Linux Security Advisory 5229-1 - Two vulnerabilities were discovered in FreeCAD, a CAD/CAM program, which could result in the execution of arbitrary shell commands when opening a malformed file.
e221b714aa252c043fe261bba268b9bb76b8a4565c7895307eb7ff13412d67b8
Debian Linux Security Advisory 5230-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
8340f3ab3bae220f6698fed84dcfba3c97ba7964c3362899da056ede5c1f36ab
Debian Linux Security Advisory 5231-1 - Several vulnerabilities were discovered in ConnMan, a network manager for embedded devices, which could result in denial of service or the execution of arbitrary code.
ce4def7ac6b137a13c8cf721dd5db4140415515ed52baee6a0d76baf78234bf0
Debian Linux Security Advisory 5232-1 - It was discovered that the wordexp() function of tinygltf, a library to load/save glTF (GL Transmission Format) files was susceptible to command execution when processing untrusted files.
6d3bf5420ed67b1fc16a49e517a64ee582d74c3582eaa12ad4ef5cb2c1800fce
Debian Linux Security Advisory 5233-1 - Maher Azzouzi discovered that missing input sanitising in the Enlightenment window manager may result in local privilege escalation to root.
038bc6131b6fd2cfa407d7ba8198b1856f3aa45cd0d7b1b66c8e56e410074926
Debian Linux Security Advisory 5234-1 - An arbitrary code execution vulnerability was disovered in fish, a command line shell. When using the default configuraton of fish, changing to a directory automatically ran `git` commands in order to display information about the current repository in the prompt. Such repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands.
d6134612ed2eb603546e00e78930c6db0692023b8724bb62b9827ee351491ec4
Debian Linux Security Advisory 5235-1 - Several vulnerabilities were discovered in BIND, a DNS server implementation.
9fd2bd0b8d48add568238f3194fca9fcb514629ef89a06fc88c357586fed0e7d
Debian Linux Security Advisory 5236-1 - Rhodri James discovered a heap use-after-free vulnerability in the doContent function in Expat, an XML parsing C library, which could result in denial of service or potentially the execution of arbitrary code, if a malformed XML file is processed.
f673ba4a86fe72896d4316423099d0e96f4f5358812e777c79d4d4a321d08a6e
Debian Linux Security Advisory 5237-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, CSP bypass or session fixation.
69842b76196deeb3b59a7b469816fe3cfbd6e3bc5d7e2ef801971d08ee2caa0f
Debian Linux Security Advisory 5238-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.
d57223f5795e7bdd2e3d8b691fef921f6ac2fd90a4e825f0c4da55c5cee17c25
Debian Linux Security Advisory 5239-1 - A heap-based buffer overflow vulnerability was discovered in gdal, a Geospatial Data Abstraction Library, which could result in denial of service or potentially the execution of arbitrary code, if a specially crafted file is processed with the PCIDSK driver.
0fb6b50b6ee5cd890c3c9950761218fa7a926dfbd72ea4b05148406effc9bd9b
Debian Linux Security Advisory 5240-1 - The following vulnerabilities have been discovered in the WebKitGTK web engine.
3e0427098536357978393be3a48cb44430d15df98e29c96eb5e4178454c2d23c
Debian Linux Security Advisory 5241-1 - The following vulnerabilities have been discovered in the WPE WebKit web engine.
52255362711b40d611616bea48bba8ab9dddb6a0dd58ffc85a9adff2e018ceac
Debian Linux Security Advisory 5242-1 - It was discovered that the Commandline class in maven-shared-utils, a collection of various utility classes for the Maven build system, can emit double-quoted strings without proper escaping, allowing shell injection attacks.
84714da50549cd80b4994a0222f28c86342b8b85cee2cb07fc540a8b7d3eba9b
Debian Linux Security Advisory 5243-1 - Several vulnerabilities were discovered in lighttpd, a fast webserver with minimal memory footprint.
a6aae53b8c1438604f791dba03551aa971cfecfcd1e7999df749aa91fbb2e3ea
Debian Linux Security Advisory 5244-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
a97e0818e04337cac43b86cb867fe835e81a0ba4b1119ab6110f2c18a842ed9c
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
253ce3cc0df967ad9371d6ea8d4eed91ec593df3ed04e08229c7cf85780c91a3
GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
c58ad39af0670efe6a8aee5e3a8b2331a1200418b64b7c51977fb396d4617114
This Metasploit module utilizes the Mobile Mouse Server by RPA Technologies, Inc protocol to deploy a payload and run it from the server. This module will only deploy a payload if the server is set without a password (default). Tested against 3.6.0.4, the current version at the time of module writing.
35ce38a49d631a1847c797e9146b16df6ce4723bdc80f1fe1d1a02f833e0ab88