jhead-3.06.0.1-5.fc37
FEDORA-2022-628829f0e6 Packages in this update: jhead-3.06.0.1-5.fc37 Update description: added patches to fix CVE-2022-41751 Read More
wordpress-5.1.15-1.el7
FEDORA-EPEL-2022-42745d5b54 Packages in this update: wordpress-5.1.15-1.el7 Update description: WordPress 5.1.15 Security Release Security updates included in this release Media: Refactor search by filename within the...
wordpress-5.9.5-1.fc35
FEDORA-2022-35ce8ecede Packages in this update: wordpress-5.9.5-1.fc35 Update description: WordPress 5.9.5 Security Release Security updates included in this release Stored XSS via wp-mail.php (post by email)...
wordpress-6.0.3-1.el9
FEDORA-EPEL-2022-a2b7e4338d Packages in this update: wordpress-6.0.3-1.el9 Update description: WordPress 6.0.3 Security Release Security updates included in this release Stored XSS via wp-mail.php (post by email)...
wordpress-6.0.3-1.fc37
FEDORA-2022-3c1f843ced Packages in this update: wordpress-6.0.3-1.fc37 Update description: WordPress 6.0.3 Security Release Security updates included in this release Stored XSS via wp-mail.php (post by email)...
wordpress-6.0.3-1.fc36
FEDORA-2022-4e099582c7 Packages in this update: wordpress-6.0.3-1.fc36 Update description: WordPress 6.0.3 Security Release Security updates included in this release Stored XSS via wp-mail.php (post by email)...
DSA-5257 linux – security update
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. Read More
DSA-5256 bcel – security update
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java...
WordPress 6.0.3 Security Release
WordPress 6.0.3 is now available! This release features several security fixes. Because this is a security release, it is recommended that you update your sites...
CVE-2020-8973
ZGR TPS200 NG in its 2.00 firmware version and 1.01 hardware version, does not properly accept specially constructed requests. This allows an attacker with access...