A vulnerability, which was classified as problematic, has been found in Hide Files on GitHub up to 2.x. This issue affects the function addEventListener of the file extension/options.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 9de0c57df81db1178e0e79431d462f6d9842742e. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216767.
Category Archives: Advisories
CVE-2020-36627
A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 is able to address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability.
webkitgtk-2.38.3-2.fc37
FEDORA-2022-6bc49e9e54
Packages in this update:
webkitgtk-2.38.3-2.fc37
Update description:
Update to 2.38.3:
Fix runtime critical warnings from media player.
Fix network process crash when fetching website data on ephemeral session.
Fix the build with Ruby 3.2.
Fix several crashes and rendering issues.
Security fixes: CVE-2022-42852, CVE-2022-42856, CVE-2022-42867, CVE-2022-46692, CVE-2022-46698, CVE-2022-46699, CVE-2022-46700
w3m-0.5.3-58.git20220429.el9
FEDORA-EPEL-2022-e4e5ecabcf
Packages in this update:
w3m-0.5.3-58.git20220429.el9
Update description:
Added upstream patch to address CVE-2022-38223 (#2126270)
w3m-0.5.3-58.git20220429.el8
FEDORA-EPEL-2022-5564c168f5
Packages in this update:
w3m-0.5.3-58.git20220429.el8
Update description:
Added upstream patch to address CVE-2022-38223 (#2126270)
w3m-0.5.3-58.git20220429.el7
FEDORA-EPEL-2022-65548d9891
Packages in this update:
w3m-0.5.3-58.git20220429.el7
Update description:
Added upstream patch to address CVE-2022-38223 (#2126270)
w3m-0.5.3-58.git20220429.fc36
FEDORA-2022-ce04ff8b49
Packages in this update:
w3m-0.5.3-58.git20220429.fc36
Update description:
Added upstream patch to address CVE-2022-38223 (#2126270)
w3m-0.5.3-58.git20220429.fc37
FEDORA-2022-7d2f942be2
Packages in this update:
w3m-0.5.3-58.git20220429.fc37
Update description:
Added upstream patch to address CVE-2022-38223 (#2126270)
OpenImageIO-2.4.6.1-1.fc37
FEDORA-2022-fc361cc7b6
Packages in this update:
OpenImageIO-2.4.6.1-1.fc37
Update description:
Update to 2.4.6.1, see release notes for details:
https://github.com/OpenImageIO/oiio/releases
Security fix for
CVE-2021-32692
Activity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the `printAppTitle.scpt` file.