CVE-2013-4309
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Read More
[R1] Stand-alone Security Patch Available for Tenable.sc versions 5.20.0 to 5.21.0: Patch 202206.1
[R1] Stand-alone Security Patch Available for Tenable.sc versions 5.20.0 to 5.21.0: Patch 202206.1 Arnie Cabral Thu, 06/30/2022 - 11:05 Tenable.sc leverages third-party software to help...
USN-5498-1: Vim vulnerabilities
It was discovered that Vim incorrectly handled memory when opening certain files. If an attacker could trick a user into opening a specially crafted file,...
osbuild-composer-56-1.fc36
FEDORA-2022-970b0fe929 Packages in this update: osbuild-composer-56-1.fc36 Update description: Update to osbuild-composer 56 Read More
CVE-2013-4146
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-3414. Reason: This candidate is a duplicate of CVE-2012-3414. Notes: All CVE users should reference...
CVE-2013-4170
In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of...
USN-5497-1: Libjpeg6b vulnerabilities
It was discovered that Libjpeg6b was not properly performing bounds checks when compressing PPM and Targa image files. An attacker could possibly use this issue...
php-laminas-diactoros2-2.11.2-1.fc36
FEDORA-2022-6628e8d771 Packages in this update: php-laminas-diactoros2-2.11.2-1.fc36 Update description: Version 2.11.2 Bug 95: Resolve Host header and X-Forwarded-Proto regressions thanks to @weierophinney Release Notes for 2.11.1...
ZDI-22-943: Parallels Desktop Updater Race Condition Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code...
ZDI-22-942: Parallels Desktop Updater Incorrect Permission Assignment Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code...