4
Red Hat: 2010:0168-01: httpd: Moderate Advisoryview story

http://www.linuxsecurity.com – LinuxSecurity.com: Updated httpd packages that fix two security issues and add an enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...] (Security)

5
Red Hat: 2010:0167-01: gnutls: Moderate Advisoryview story

http://www.linuxsecurity.com – LinuxSecurity.com: Updated gnutls packages that fix two security issues are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having moderate [More...] (Security)

3
Red Hat: 2010:0173-02: openssl096b: Important Advisoryview story

http://www.linuxsecurity.com – LinuxSecurity.com: Updated openssl096b packages that fix one security issue are now available for Red Hat Enterprise Linux 3 and 4. The Red Hat Security Response Team has rated this update as having [More...] (Security)

3
Red Hat: 2010:0165-01: nss: Moderate Advisoryview story

http://www.linuxsecurity.com – LinuxSecurity.com: Updated nss packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate [More...] (Security)

4
Red Hat: 2010:0164-01: openssl097a: Moderate Advisoryview story

http://www.linuxsecurity.com – LinuxSecurity.com: Updated openssl097a packages that fix a security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...] (Security)

4
Ubuntu: 918-1: Samba vulnerabilityview story

http://www.linuxsecurity.com – LinuxSecurity.com: It was discovered the Samba handled symlinks in an unexpected way when both"wide links" and "UNIX extensions" were enabled, which is the default. Aremote attacker could create symlinks and access arbitrary files from theserver. [More...] (Security)

6
Red Hat: 2010:0161-01: kernel-rt: Important Advisoryview story

http://www.linuxsecurity.com – LinuxSecurity.com: Updated kernel-rt packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise MRG 1.2. The Red Hat Security Response Team has rated this update as having [More...] (Security)

4
Army Surplusview story

http://www.armysurplus365.co.uk – Army surplus are goods and equipment that the military people use in excess. The military usually sold these materials or dispose when they no longer need it. These goods and commodities can be bought at surplus stores. In these items, we can include clothing such as trousers, jackets, footwear, equipment, headgear, camping and useful tools. (Security)

6
Debian: 2021-1: spamass-milter: missing input sanitizationview story

http://www.linuxsecurity.com – LinuxSecurity.com: It was discovered a missing input sanitization in spamass-milter, a milter used to filter mail through spamassassin. This allows a remote attacker to inject and execute arbitrary shell commands. [More...] (Security)

4
Debian: 2020-1: ikiwiki: insufficient input sanitizaview story

http://www.linuxsecurity.com – LinuxSecurity.com: Ivan Shmakov discovered that the htmlscrubber component of ikwiki, a wiki compiler, performs insufficient input sanitization on data:image/svg+xml URIs. As these can contain script code this can be used by an attacker to conduct cross-site scripting attacks. [More...] (Security)

6
Red Hat: 2010:0155-01: java-1.4.2-ibm: Moderate Advisoryview story

http://www.linuxsecurity.com – LinuxSecurity.com: Updated java-1.4.2-ibm packages that fix one security issue and a bug are now available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary. [More...] (Security)

5
Ubuntu: 912-1: Audio File Library vulnerabilityview story

http://www.linuxsecurity.com – LinuxSecurity.com: It was discovered that Audio File Library contained a heap-based bufferoverflow. If a user or automated system processed a crafted WAV file, anattacker could cause a denial of service via application crash, or possiblyexecute arbitrary code with the privileges of the user invoking theprogram. The default compiler options for Ubuntu should reduce this [More...] (Security)