A vulnerability was found in annyshow DuxCMS 2.1. It has been classified as problematic. This affects an unknown part of the file admin.php&r=article/AdminContent/edit of the component Article Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215115.
Category Archives: Advisories
python3-docs-3.10.9-1.fc36 python3.10-3.10.9-1.fc36
FEDORA-2022-e699dd5247
Packages in this update:
python3.10-3.10.9-1.fc36
python3-docs-3.10.9-1.fc36
Update description:
Update to 3.10.9
python3.10-3.10.9-1.fc37
FEDORA-2022-b2f06fbb62
Packages in this update:
python3.10-3.10.9-1.fc37
Update description:
Update to 3.10.9
python3.9-3.9.16-1.fc35
FEDORA-2022-6f4e6120d7
Packages in this update:
python3.9-3.9.16-1.fc35
Update description:
Update to 3.9.16
python3.9-3.9.16-1.fc36
FEDORA-2022-fd3771db30
Packages in this update:
python3.9-3.9.16-1.fc36
Update description:
Update to 3.9.16
python3.9-3.9.16-1.fc37
FEDORA-2022-6b8b96f883
Packages in this update:
python3.9-3.9.16-1.fc37
Update description:
Update to 3.9.16
CVE-2022-23476 (nokogiri)
Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.
USN-5766-1: Heimdal vulnerability
It was discovered that Heimdal did not properly manage memory when
normalizing Unicode. An attacker could possibly use this issue to
cause a denial of service.
CVE-2022-2002
GE CIMPICITY versions 2022 and prior is vulnerable when data from faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code.
CVE-2022-23471
containerd is an open source container runtime. A bug was found in containerd’s CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user’s process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd’s CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.