java-latest-openjdk-19.0.1.0.10-2.rolling.fc35
FEDORA-2022-ec7de69ceb Packages in this update: java-latest-openjdk-19.0.1.0.10-2.rolling.fc35 Update description: New in release OpenJDK 19.0.1 (2022-10-18) Full release notes This update depends on FEDORA-2022-10bb6f119e CVEs Fixed CVE-2022-21618...
CVE-2021-38397
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute arbitrary code...
CVE-2021-38395
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralization of special elements in output, which may allow an attacker to...
CVE-2021-36206
All versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with...
USN-5705-1: LibTIFF vulnerabilities
Chintan Shah discovered that LibTIFF incorrectly handled memory in certain conditions. An attacker could trick a user into processing a specially crafted image file and...
USN-5706-1: Linux kernel (Azure CVM) vulnerabilities
It was discovered that the BPF verifier in the Linux kernel did not properly handle internal data structures. A local attacker could use this to...
New York Post was hacked from the inside, employee fired after offensive articles posted online
The Murdoch-owned New York Post published a series of incendiary and offensive articles online earlier today, calling for the assassination of political figures like Joe...
Kiss-a-Dog Cryptojacking Campaign Targets Docker and Kubernetes
The threat actors also utilized user and kernel mode rootkits to hide the activity Read More
BrandPost: 10 Best Practices for a Zero Trust Data Center
Today, there is no such thing as an enterprise network perimeter — the location of applications, users, and their devices are no longer static; BYOD...
BrandPost: Top 5 Regulatory Reasons for Implementing Zero Trust
We are beyond the point of viewing Zero Trust as a simple marketing feature for information technology or cybersecurity companies. It is a floor for...