[CVE-2022-3747] BeCustom <= 1.0.5.2 Generic Cross-Site Request Forgery
Posted by Julien Ahrens (RCE Security) on Nov 15 RCE Security Advisory https://www.rcesecurity.com 1. ADVISORY INFORMATION ======================= Product: BeCustom Wordpress Plugin Vendor URL: https://muffingroup.com/betheme/features/be-custom/ Type:...
Cisco Secure Email Gateways can easily be circumvented
Posted by FD on Nov 15 This report is being published within a coordinated disclosure procedure. The researcher has been in contact with the vendor...
USN-5725-1: Go vulnerability
Diederik Loerakker, Jonny Rhea, Raúl Kripalani, and Preston Van Loon discovered that Go incorrectly handled certain inputs. An attacker could possibly use this issue to...
python3.7-3.7.15-2.fc36
FEDORA-2022-385d2ea041 Packages in this update: python3.7-3.7.15-2.fc36 Update description: Security fix for CVE-2022-37454 Read More
python3.8-3.8.15-2.fc36
FEDORA-2022-5fd3e7f635 Packages in this update: python3.8-3.8.15-2.fc36 Update description: Security fix for CVE-2022-37454 Read More
freerdp-2.8.1-1.fc35
FEDORA-2022-e733724edb Packages in this update: freerdp-2.8.1-1.fc35 Update description: Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283). Read More
freerdp-2.8.1-1.fc36
FEDORA-2022-45b9fbfcbe Packages in this update: freerdp-2.8.1-1.fc36 Update description: Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283). Read More
freerdp-2.8.1-1.fc37
FEDORA-2022-d6310a1308 Packages in this update: freerdp-2.8.1-1.fc37 Update description: Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283). Read More
ZDI-22-1592: Parse Server _expandResultOnKeyPath Prototype Pollution Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is required to exploit this vulnerability. Read More
ZDI-22-1591: Parse Server buildUpdatedObject Prototype Pollution Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is required to exploit this vulnerability. Read More