ZDI-22-872: DevExpress SafeBinaryFormatter Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. Read More
python-twisted-22.4.0-1.fc37
FEDORA-2022-dc6dc2cfd3 Packages in this update: python-twisted-22.4.0-1.fc37 Update description: Automatic update for python-twisted-22.4.0-1.fc37. Changelog * Thu Jun 23 2022 Robert-André Mauchin <zebob.m@gmail.com> 22.4.0-1 - Update to...
USN-5492-1: Vim vulnerability
It was discovered that Vim incorrectly handled memory when opening and searching the contents of certain files. If an attacker could trick a user into...
USN-5487-3: Apache HTTP Server regression
USN-5487-1 fixed several vulnerabilities in Apache HTTP Server. Unfortunately it caused regressions. USN-5487-2 reverted the patches that caused the regression in Ubuntu 14.04 ESM for...
exim-4.95-1.el8
FEDORA-EPEL-2022-ac75a8517c Packages in this update: exim-4.95-1.el8 Update description: This is an update fixing CVE-2021-38371. Read More
USN-5487-2: Apache HTTP Server regression
USN-5487-1 fixed a vulnerabilities in Apache. Unfortunately, that update introduced a regression when proxying balancer manager connections in some configurations on Ubuntu 14.04 ESM. This...
CVE-2017-20085
A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic...
CVE-2017-20086
A vulnerability, which was classified as critical, was found in VaultPress Plugin 1.8.4. This affects an unknown part. The manipulation leads to code injection. It...
CVE-2017-20087
A vulnerability, which was classified as problematic, has been found in Alpine PhotoTile for Instagram Plugin 1.2.7.7. Affected by this issue is some unknown functionality....
CVE-2017-20088
A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is...