This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-6811.
Daily Archives: July 18, 2024
ZDI-24-904: IrfanView WSQ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-6812.
SolarWinds Serv-U Information Disclosure Vulnerability (CVE-2024-28995)
What is the Vulnerability?A Directory Traversal Vulnerability in SolarWinds Serv-U software is being actively exploited in the wild. Tracked as CVE-2024-28995, the vulnerability is due to improper validation of the user-supplied inputs. An attacker could exploit this vulnerability by sending crafted requests to the target host machine. Successful exploitation could allow access to read sensitive files on the host machine. CISA has added CVE-2024-28995 to its Known Exploited Vulnerabilities (KEV) catalog on July 17, 2024 and a publicly available proof-of-concept (PoC) exploit code is available.What is the recommended Mitigation?Apply the most recent upgrade or patch from the vendor. https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995 What FortiGuard Coverage is available?FortiGuard Labs has provided protection through the IPS signature ” SolarWinds.Serv-U.InternalDir.Directory.Traversal” to detect and block any attack attempts targeting the vulnerability (CVE-2024-28995). FortiGuard Endpoint Vulnerability Signature can help to detect vulnerable software instances (CVE-2024-28995). The FortiGuard Incident Response team can be engaged to help with any suspected compromise.
python-scrapy-2.11.2-1.fc40
FEDORA-2024-c27b82d702
Packages in this update:
python-scrapy-2.11.2-1.fc40
Update description:
Update to 2.11.2
python-scrapy-2.11.2-1.fc39
FEDORA-2024-0bd3b1212e
Packages in this update:
python-scrapy-2.11.2-1.fc39
Update description:
Update to 2.11.2
DSA-5733-1 thunderbird – security update
Multiple security issues were discovered in Thunderbird, which could
potentially result in the execution of arbitrary code.
DSA-5732-1 chromium – security update
Security issues were discovered in Chromium which could result
in the execution of arbitrary code, denial of service, or information
disclosure.