tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc38
FEDORA-2023-6f9e904861 Packages in this update: tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc38 Update description: Update to git snapshot 4fdf178 for CVE-2023-45239; Fixes: RHBZ#2242402 Read More
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc39
FEDORA-2023-96c21ed09c Packages in this update: tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc39 Update description: Update to git snapshot 4fdf178 for CVE-2023-45239; Fixes: RHBZ#2242402 Read More
tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc40
FEDORA-2023-a219299297 Packages in this update: tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc40 Update description: Automatic update for tacacs-F4.0.4.28.7fb~20231005g4fdf178-1.fc40. Changelog * Thu Oct 5 2023 Davide Cavalca <dcavalca@fedoraproject.org> - F4.0.4.28.7fb~20231005g4fdf178-1 - Update...
Multiple Vulnerabilities in Progress WS_FTP Server Could Allow for Remote Command Execution.
Multiple vulnerabilities in Progress WS_FTP Server have been discovered, the most severe of which could allow for remote command execution. Progress WS_FTP Server is used...
A Vulnerability in Atlassian Confluence Server and Data Center Could Allow for Privilege Escalation
A vulnerability has been discovered in Atlassian Confluence Server and Data Center, which could allow for Privilege Escalation. Confluence is a collaboration tool that brings...
A Vulnerability in Cisco Emergency Responder Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Cisco Emergency Responder that could allow for arbitrary code execution on a targeted host. Successful exploitation could allow an...
icecat-115.3.1-7.rh2.fc38
FEDORA-2023-7342330743 Packages in this update: icecat-115.3.1-7.rh2.fc38 Update description: Release 115.3.1 Read More
icecat-115.3.1-7.rh2.fc39
FEDORA-2023-035866b576 Packages in this update: icecat-115.3.1-7.rh2.fc39 Update description: Release 115.3.1 Read More
Smashing Security podcast #342: Royal family attacked, keyless car theft, and a deepfake Tom Hanks
Is a deepfake Tom Hanks better than the real thing? Who has been attacking the British Royal Family’s website, and why? And how can you...
CISA and NSA Tackle IAM Security Challenges in New Report
The document is authored by the Enduring Security Framework Read More