ZDI-24-1152: Phoenix Contact CHARX SEC-3100 Improper Access Control Authentication Bypass Vulnerability
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability....
USN-6967-1: Intel Microcode vulnerabilities
It was discovered that some Intel® Core™ Ultra Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to...
dovecot-2.3.21.1-1.fc39
FEDORA-2024-ba5bb9f63a Packages in this update: dovecot-2.3.21.1-1.fc39 Update description: CVE-2024-23184: A large number of address headers in email resulted in excessive CPU usage. CVE-2024-23185: Abnormally large...
dovecot-2.3.21.1-1.fc40
FEDORA-2024-e23e8a3f1e Packages in this update: dovecot-2.3.21.1-1.fc40 Update description: CVE-2024-23184: A large number of address headers in email resulted in excessive CPU usage. CVE-2024-23185: Abnormally large...
USN-6951-3: Linux kernel (Azure) vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...
USN-6968-1: PostgreSQL vulnerability
Noah Misch discovered that PostgreSQL incorrectly handled certain SQL objects. An attacker could possibly use this issue to execute arbitrary SQL functions as the superuser....
python3.6-3.6.15-35.fc41
FEDORA-2024-96ed485f6d Packages in this update: python3.6-3.6.15-35.fc41 Update description: Automatic update for python3.6-3.6.15-35.fc41. Changelog * Fri Aug 16 2024 Tomáš Hrnčiar <thrnciar@redhat.com> - 3.6.15-35 - Security...
python3.6-3.6.15-35.fc42
FEDORA-2024-945226bee4 Packages in this update: python3.6-3.6.15-35.fc42 Update description: Automatic update for python3.6-3.6.15-35.fc42. Changelog * Fri Aug 16 2024 Tomáš Hrnčiar <thrnciar@redhat.com> - 3.6.15-35 - Security...
USN-6966-1: Firefox vulnerabilities
Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to...
USN-6837-2: Rack vulnerabilities
It was discovered that Rack incorrectly parsed certain media types. A remote attacker could possibly use this issue to cause Rack to consume resources, leading...