Red Hat Security Advisory 2019-3048-01 - Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. These packages provide security updates to adapters for use with Red Hat Single Sign-On 7.3.4 for Red Hat JBoss Enterprise Application Platform 6. An adapter endpoints exposure issue was addressed.
0a61999bfa353ad4e11e6813f47bd9db4d834788148886bd0a6fd12c5aa154bb
Red Hat Security Advisory 2019-3046-01 - Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.3.4 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.3.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass and code execution vulnerabilities.
1c5ce3a2e792c484a35bbfedebb9faf09707919d52c7b94ffb2efd2574f350b1
Red Hat Security Advisory 2019-3045-01 - Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.3.4 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.3.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass and code execution vulnerabilities.
25a7f97bad8da82c50f08211d3c95b7f64aad5e4fc389d225ac6778b8760a341
Red Hat Security Advisory 2019-3044-01 - Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.3.4 on RHEL 6 serves as a replacement for Red Hat Single Sign-On 7.3.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass and code execution vulnerabilities.
28fdd249e638c3fd71315c752051e3df9e19e8c9b9a7fa59bc5e6d80541cecbe
Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.
7e035f142a51fca1359705792627a282456d49749bf62a37a8e48375d41baaa9
Red Hat Security Advisory 2019-2989-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. TLS verification and SSH host key verification issues were addressed.
aecfbd19053c363a055c19af80d59e1abc730b8bb7f0ecd2cc37ac3ffce2642c
ASUS RT-N10+ with firmware version 2.0.3.4 suffers from cross site request forgery and cross site scripting vulnerabilities that can assist with achieving command execution.
180bc134d00505aeee98979c9045c6ba75f0c0fb8e0cbf15853e5e72014cac0b
Apple Security Advisory 2019-10-11-1 - Swift 5.1.1 for Ubuntu is now available and addresses an issue with data disclosure.
ae6a4e66daeb305f97efda515b6df668679c974f527b84e1d3a96ad3f23d62f5
Kirona-DRS version 5.5.3.5 suffers from an information disclosure vulnerability.
1c93910e307e7e1289dbe38b480fe1274825a263bc33d40e002e18b60312d2e5
Express Invoice version 7.12 suffers from a persistent cross site scripting vulnerability.
c9663e5a3798dcf9b29f872e7dc53dc2322ae7af2139cb5ea0e72920d5075fa4
Debian Linux Security Advisory 4539-3 - The update for openssl released as DSA 4539-1 introduced a regression where AES-CBC-HMAC-SHA ciphers were not enabled. Updated openssl packages are now available to correct this issue.
18df6954681a95f7600d5f7005d8a30107bd8d960e5a7d9edcda66e4f1c26854
ActiveFax Server version 6.92 build 0316 POP3 server denial of service exploit.
5cc70a7770ce1dedc01344cacdf36eb5f9a4069d5a085fd30a234c608859d686
Various Open-Xchange OX App Suite versions suffer from server-side request forgery, cross site scripting, information disclosure, and improper access control vulnerabilities.
6bbc17512735cd2e68b49123c22dd4e31db09620ca1cc4d07081dd51dda4894a
SpotAuditor version 5.3.1.0 suffers from a denial of service vulnerability.
c56f1acd2518579bc33a43ebc8128f90a65657da1a212378b5085588931a35d8
Uplay version 92.0.0.6280 suffers from a local privilege escalation vulnerability.
4825ec06d3a4229cc4dc78bc69ad8929fa3bad21fde0cf04bbc4ea8486760f8b