A vulnerability was found in Itech News Portal 6.28. It has been classified as critical. Affected is an unknown function of the file /news-portal-script/information.php. The manipulation of the argument inf leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Category Archives: Advisories
graphviz-5.0.0-2.fc37
FEDORA-2022-c08ba3b73c
Packages in this update:
graphviz-5.0.0-2.fc37
Update description:
Automatic update for graphviz-5.0.0-2.fc37.
Changelog
* Fri Jul 15 2022 Jiri Vanek <jvanek@redhat.com> – 5.0.0-2
– adapted to removal of java on i686
– finsihing merged https://src.fedoraproject.org/rpms/graphviz/pull-request/9#request_diff
– ifed out on i686 recomanded rm -v…
– set –enable-java=no for non java arches
– added changelog entry, bumped release
– https://bugzilla.redhat.com/show_bug.cgi?id=2104225
flatpak-runtime-f35-3520220715142120.1 flatpak-sdk-f35-3520220715142120.1
FEDORA-FLATPAK-2022-b97286ca26
Packages in this update:
flatpak-runtime-f35-3520220715142120.1
flatpak-sdk-f35-3520220715142120.1
Update description:
This updates the Flatpak runtime and SDK for F35 to current packages, including numerous security fixes and bug fixes.
flatpak-runtime-f36-3620220713115040.1 flatpak-sdk-f36-3620220713115040.1
FEDORA-FLATPAK-2022-fd8a0ada58
Packages in this update:
flatpak-runtime-f36-3620220713115040.1
flatpak-sdk-f36-3620220713115040.1
Update description:
This updates the Flatpak runtime and SDK for F36 to current packages, including numerous security fixes and bug fixes.
harfbuzz-4.0.0-2.fc36
FEDORA-2022-a32f9488a0
Packages in this update:
harfbuzz-4.0.0-2.fc36
Update description:
Security fix for CVE-2022-33068
ZDI-22-1020: (Pwn2Own) Inductive Automation Ignition ZIP File Insufficient UI Warning Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-22-1019: (Pwn2Own) Inductive Automation Ignition Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-22-1018: (Pwn2Own) Inductive Automation Ignition Missing Authentication for Critical Function Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability.
ZDI-22-1017: (Pwn2Own) Inductive Automation Ignition Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
ZDI-22-1016: (Pwn2Own) Inductive Automation Ignition Authentication Bypass Vulnerability
This vulnerability allows remote attackers to bypass authentication on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability.