This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability.
Category Archives: Advisories
ZDI-22-944: Autodesk AutoCAD CATPart File Parsing Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR) and Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.
Mozilla Firefox is a web browser used to access the Internet.
Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.
Mozilla Thunderbird is an email client.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
USN-5496-1: cloud-init vulnerability
Mike Stroyan discovered that cloud-init could log password hashes when
reporting schema failures. An attacker with access to these logs could
potentially use this to gain user credentials.
onionscan-0.2-11.fc36
FEDORA-2022-75ba99551f
Packages in this update:
onionscan-0.2-11.fc36
Update description:
Disable TestExtractBitcoinAddress test
golang-github-mattn-colorable-0.1.8-6.fc36
FEDORA-2022-7bff7b77a1
Packages in this update:
golang-github-mattn-colorable-0.1.8-6.fc36
Update description:
Convert to rpmautospec
firefox-102.0-1.fc36
FEDORA-2022-59e474cd5c
Packages in this update:
firefox-102.0-1.fc36
Update description:
Update to new upstream (102.0)
firefox-102.0-1.fc35
FEDORA-2022-5d052cb6e0
Packages in this update:
firefox-102.0-1.fc35
Update description:
Update to new upstream (102.0)
direnv-2.32.1-1.fc36
FEDORA-2022-6107f89f14
Packages in this update:
direnv-2.32.1-1.fc36
Update description:
Update to 2.32.1
CVE-2013-2235
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA.