This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Cisco RV340 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
More Stories
perl-Plack-Middleware-Session-0.36-1.fc42
FEDORA-2025-ca07c36a0a Packages in this update: perl-Plack-Middleware-Session-0.36-1.fc42 Update description: This update upgrade the package to version 0.36. This version fixes CVE-2025-40923...
perl-Catalyst-Plugin-Session-0.44-1.fc42
FEDORA-2025-90d5989bee Packages in this update: perl-Catalyst-Plugin-Session-0.44-1.fc42 Update description: This update upgrade the package to version 0.44. This version fixes CVE-2025-40924...
perl-Catalyst-Authentication-Credential-HTTP-1.019-1.fc42
FEDORA-2025-d72429a1f8 Packages in this update: perl-Catalyst-Authentication-Credential-HTTP-1.019-1.fc42 Update description: This update upgrade the package to version 1.019. This version fixes CVE-2025-40920...
DSA-5994-1 shibboleth-sp – security update
Florian Stuhlmann discovered a SQL vulnerability in the ODBC plugin in the Shibboleth Service Provider which may result in information...
libopenmpt-0.8.3-1.el10_0
FEDORA-EPEL-2025-dc43510de4 Packages in this update: libopenmpt-0.8.3-1.el10_0 Update description: libopenmpt 0.8.3 (2025-09-06) [Bug] libopenmpt is now compatible with most non-standard builds...
libopenmpt-0.8.3-1.el10_2
FEDORA-EPEL-2025-3f414a0955 Packages in this update: libopenmpt-0.8.3-1.el10_2 Update description: libopenmpt 0.8.3 (2025-09-06) [Bug] libopenmpt is now compatible with most non-standard builds...