USN-5725-1: Go vulnerability
Diederik Loerakker, Jonny Rhea, Raúl Kripalani, and Preston Van Loon discovered that Go incorrectly handled certain inputs. An attacker could possibly use this issue to...
python3.7-3.7.15-2.fc36
FEDORA-2022-385d2ea041 Packages in this update: python3.7-3.7.15-2.fc36 Update description: Security fix for CVE-2022-37454 Read More
python3.8-3.8.15-2.fc36
FEDORA-2022-5fd3e7f635 Packages in this update: python3.8-3.8.15-2.fc36 Update description: Security fix for CVE-2022-37454 Read More
freerdp-2.8.1-1.fc35
FEDORA-2022-e733724edb Packages in this update: freerdp-2.8.1-1.fc35 Update description: Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283). Read More
freerdp-2.8.1-1.fc36
FEDORA-2022-45b9fbfcbe Packages in this update: freerdp-2.8.1-1.fc36 Update description: Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283). Read More
freerdp-2.8.1-1.fc37
FEDORA-2022-d6310a1308 Packages in this update: freerdp-2.8.1-1.fc37 Update description: Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283). Read More
ZDI-22-1592: Parse Server _expandResultOnKeyPath Prototype Pollution Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is required to exploit this vulnerability. Read More
ZDI-22-1591: Parse Server buildUpdatedObject Prototype Pollution Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is required to exploit this vulnerability. Read More
ZDI-22-1590: Parse Server transformUpdate Prototype Pollution Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-1589: Microsoft Windows Output Protection Manager Integer Overflow Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code...