php-8.1.8-1.fc36
FEDORA-2022-ec0491574d Packages in this update: php-8.1.8-1.fc36 Update description: PHP version 8.1.8 (07 Jul 2022) Core: Fixed bug GH-8338 (Intel CET is disabled unintentionally). (Chen, Hu)...
ZDI-22-949: (0Day) xhyve e1000 Stack-based Buffer Overflow Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of xhyve. An attacker must first obtain the ability to execute high-privileged code on...
DSA-5178 intel-microcode – security update
This update ships updated CPU microcode for some types of Intel CPUs and provides mitigations for security vulnerabilities. Read More
webkit2gtk3-2.36.4-1.fc36
FEDORA-2022-fdb75e7766 Packages in this update: webkit2gtk3-2.36.4-1.fc36 Update description: Fix the new ATSPI accessibility implementation to add the missing Collection interface for the loaded document. Fix...
webkit2gtk3-2.36.4-1.fc35
FEDORA-2022-6b749525f3 Packages in this update: webkit2gtk3-2.36.4-1.fc35 Update description: Fix the new ATSPI accessibility implementation to add the missing Collection interface for the loaded document. Fix...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser...
CVE-2021-44915
Taocms 3.0.2 was discovered to contain a blind SQL injection vulnerability via the function Edit category. Read More
USN-5504-1: Firefox vulnerabilities
Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to...
libgit2-1.3.1-1.fc36
FEDORA-2022-dc3e8972a1 Packages in this update: libgit2-1.3.1-1.fc36 Update description: This is an upstream security release. For details, please review the upstream announcement. Additionally, this drops the...
CVE-2021-43116
An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then...