CVE-2020-29506
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain an Observable Timing Discrepancy Vulnerability. Read More
CVE-2020-29507
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.4, and Dell BSAFE Micro Edition Suite, versions before 4.4, contain an Improper Input Validation Vulnerability. Read More
vim-9.0.049-1.fc35
FEDORA-2022-9d7a58e376 Packages in this update: vim-9.0.049-1.fc35 Update description: Security fixes for CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2288, CVE-2022-2289, CVE-2022-2264, CVE-2022-2304. Read More
vim-9.0.049-1.fc36
FEDORA-2022-b06fbea2c7 Packages in this update: vim-9.0.049-1.fc36 Update description: The newest upstream commit Security fixes for CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2288, CVE-2022-2289, CVE-2022-2264, CVE-2022-2304. Read...
USN-5508-1: Python LDAP vulnerability
It was discovered that Python LDAP incorrectly handled certain regular expressions. An remote attacker could possibly use this issue to cause a denial of service....
buildah-1.26.2-1.fc36
FEDORA-2022-c904572450 Packages in this update: buildah-1.26.2-1.fc36 Update description: auto bump to v1.26.2 Read More
oci-seccomp-bpf-hook-1.2.6-1.fc35
FEDORA-2022-7c45aa090a Packages in this update: oci-seccomp-bpf-hook-1.2.6-1.fc35 Update description: auto bump to v1.2.6 Read More
oci-seccomp-bpf-hook-1.2.6-1.fc36
FEDORA-2022-24438de133 Packages in this update: oci-seccomp-bpf-hook-1.2.6-1.fc36 Update description: auto bump to v1.2.6 Read More
USN-5509-1: Dovecot vulnerability
Julian Brook discovered that Dovecot incorrectly handled multiple passdb configuration entries. In certain configurations, a remote attacker could possibly use this issue to escalate privileges....
ZDI-22-961: Linux Kernel LightNVM Subsystem Heap-based Overflow Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code...