Ubuntu versions prior to 15.10 suffer from a PT chown arbitrary PTs access via user namespace privilege escalation vulnerability.
ebfda6a018f1d7bdcee1fac1fe9bffc5393c7667fb1b61ffa9a97d92473d2f4f
Attackers can siphon information from Splunk Enterprise if an authenticated Splunk user visits a malicious webpage. Some useful data gained is the currently logged in username and if remote user setting is enabled. After, the username can be use to Phish or Brute Force Splunk Enterprise login. Additional information stolen may aid in furthering attacks.
38b4becdb0191488960685a01c5248ca824dcc3e062117c8e032509bc4a60767
NTP suffers from a privilege escalation vulnerability.
8d030faabc096e431057616fc15a37c36b8595519b0f4b3b9895b50fc5eea65d
AUFS (Ubuntu 15.10) suffers from an allow_userns fuse/xattr user namespaces privilege escalation vulnerability.
20b06274c846785d08a17e0785b09b252e022b89872f6b1806dfba387493b3c6
Linux kernel version 2.6.32 (Ubuntu 10.04) suffers from a /proc handling setuid privilege escalation vulnerability.
3594c9413e10a2969f55206fd998c42d9a560202fece7a9015817bf484936e19