Diederik Loerakker, Jonny Rhea, Raúl Kripalani, and Preston
Van Loon discovered that Go incorrectly handled certain inputs.
An attacker could possibly use this issue to cause Go applications
to hang or crash, resulting in a denial of service.
Category Archives: Advisories
python3.7-3.7.15-2.fc36
FEDORA-2022-385d2ea041
Packages in this update:
python3.7-3.7.15-2.fc36
Update description:
Security fix for CVE-2022-37454
python3.8-3.8.15-2.fc36
FEDORA-2022-5fd3e7f635
Packages in this update:
python3.8-3.8.15-2.fc36
Update description:
Security fix for CVE-2022-37454
freerdp-2.8.1-1.fc35
FEDORA-2022-e733724edb
Packages in this update:
freerdp-2.8.1-1.fc35
Update description:
Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283).
freerdp-2.8.1-1.fc36
FEDORA-2022-45b9fbfcbe
Packages in this update:
freerdp-2.8.1-1.fc36
Update description:
Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283).
freerdp-2.8.1-1.fc37
FEDORA-2022-d6310a1308
Packages in this update:
freerdp-2.8.1-1.fc37
Update description:
Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283).
ZDI-22-1592: Parse Server _expandResultOnKeyPath Prototype Pollution Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is required to exploit this vulnerability.
ZDI-22-1591: Parse Server buildUpdatedObject Prototype Pollution Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is required to exploit this vulnerability.
ZDI-22-1590: Parse Server transformUpdate Prototype Pollution Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is not required to exploit this vulnerability.
ZDI-22-1589: Microsoft Windows Output Protection Manager Integer Overflow Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.