FEDORA-FLATPAK-2023-85f15b91dc
Packages in this update:
firefox-flatpak-120.0-2
Update description:
Fixed freezes on Google Maps
Update to 120.0
firefox-flatpak-120.0-2
Fixed freezes on Google Maps
Update to 120.0
opendkim-2.11.0-0.36.el9
Add upstream PR that filters Authentication-Results headers correctly to fix CVE-2022-48521.
firefox-120.0-3.fc37
Fixed freezes on Google Maps
Updated to latest upstream (120.0)
Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Nov 27
SEC Consult Vulnerability Lab Security Advisory < 20231123-0 >
=======================================================================
title: Uninstall Key Caching
product: Fortra Digital Guardian Agent Uninstaller
(Data Loss Prevention)
vulnerable version: Agent: <7.9.4
fixed version: Agent: 7.9.4
CVE number: CVE-2023-6253
impact: High…
Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Nov 27
SEC Consult Vulnerability Lab Security Advisory < 20231122-0 >
=======================================================================
title: Multiple Vulnerabilities
product: m-privacy TightGate-Pro
vulnerable version: Rolling Release, servers with the following package
versions are vulnerable:
tightgatevnc < 4.1.2~1
rsbac-policy-tgpro <…
Posted by Phos4Me via Fulldisclosure on Nov 27
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
gnutls-3.8.2-1.fc38
New upstream release with a fix for GNUTLS-SA-2023-10-23.
gnutls-3.8.2-1.fc39
New upstream release with a fix for GNUTLS-SA-2023-10-23.
Posted by Maurizio Ruchay via Fulldisclosure on Nov 27
Advisory ID: SYSS-2023-019
Product: SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway
Manufacturer: Patton LLC
Affected Version(s): <= 3.21.2-23021
Tested Version(s): 2.21.1-22041, 3.21.2-23021, 3.22.0-23083
Vulnerability Type: OS Command Injection (CWE-78)
Vulnerability Type: Improper Access Control (CWE-284)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2023-07-05
Public Disclosure: 2023-08-28
CVE…
Posted by Kevin on Nov 27
running on the remote port specified during setup