Security Vulnerabilities
- CVEs Published In November 2019
Perdition before 2.2 may have weak security when handling outbound connections, caused by an error in the STARTTLS IMAP and POP server. ssl_outgoing_ciphers not being applied to STARTTLS connections
ClamAV before 0.97.7 has WWPack corrupt heap memory
ClamAV before 0.97.7 has buffer overflow in the libclamav component
ClamAV before 0.97.7: dbg_printhex possible information leak
Chrony before 1.29.1 has traffic amplification in cmdmon protocol
OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution
TemaTres 3.0 allows remote unprivileged users to create an administrator account
TemaTres 3.0 has stored XSS via the value parameter to the vocab/admin.php?vocabulario_id=list URI.
A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
An issue was discovered in the AbuseFilter extension through 1.34 for MediaWiki. Once a specific abuse filter has (accidentally or otherwise) been made public, its previous versions can be exposed, thus potentially disclosing private or sensitive information within the filter's definition.