FEDORA-2023-6bdc769313
Packages in this update:
cutter-re-2.2.0-1.fc37
rizin-0.5.1-1.fc37
Update description:
rebase rizin to v0.5.1 and cutter-re to 0.2.0
cutter-re-2.2.0-1.fc37
rizin-0.5.1-1.fc37
rebase rizin to v0.5.1 and cutter-re to 0.2.0
cutter-re-2.2.0-1.fc38
rizin-0.5.1-1.fc38.2
rebase rizin to v0.5.1 and cutter-re to 0.2.0
It was discovered that IPython incorrectly processed REST API POST requests.
An attacker could possibly use this issue to launch a cross-site request
forgery (CSRF) attack and leak user’s sensitive information. This issue
only affected Ubuntu 14.04 ESM. (CVE-2015-5607)
It was discovered that IPython did not properly manage cross user temporary
files. A local attacker could possibly use this issue to execute arbitrary
code. This issue only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.
(CVE-2022-21699)
Managed cybersecurity vendor Trustwave said Tuesday that it will be partnering with extended detection and response company Trellix for a combined XDR/MDR offering.
MDR, as offered by Trustwave, essentially works as a remote, third-party security operations center. The idea is, given the growing complexity of modern security threat landscapes, to let end user companies simply offload key parts of their security setups. That’s particularly important in the case of mid-size companies where the in-house security team might not be particularly large.
Gartner’s 2021 Market Guide for XDR describes the technology as a way to integrate a wide array of different security tools — covering endpoints, network, email and so on — into a holistic picture. Rather than using a traditional SIEM system, which is essentially just a log of all security related events, companies can use XDR to not only track events, but to quickly correlate them and separate false alarms from actual threats.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unity Technologies Unity Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unity Technologies Unity Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Unity Technologies Unity Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unity Technologies Unity Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unity Technologies Unity Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.