FEDORA-2022-b651cb69e6
Packages in this update:
openssl1.1-1.1.1o-1.fc36
Update description:
Security fix for CVE-2022-1292
Upgrade to 1.1.1o, rhbz#2095817.
openssl1.1-1.1.1o-1.fc36
Security fix for CVE-2022-1292
Upgrade to 1.1.1o, rhbz#2095817.
openssl1.1-1.1.1o-1.fc37
Automatic update for openssl1.1-1.1.1o-1.fc37.
* Mon Jun 13 2022 Clemens Lang <cllang@redhat.com> – 1:1.1.1o-1
– Upgrade to 1.1.1o
Resolves: CVE-2022-1292
Related: rhbz#2095817
python-bottle-0.12.21-2.el8
Cookie test fix backported from upstream (0.12)
Security fix for CVE-2022-31799
python-bottle-0.12.21-2.el9
Cookie test fix backported from upstream (0.12)
Security fix for CVE-2022-31799
python-bottle-0.12.21-2.fc35
Cookie test fix backported from upstream (0.12)
Security fix for CVE-2022-31799
python-bottle-0.12.21-2.fc36
Cookie test fix backported from upstream (0.12)
Security fix for CVE-2022-3179
A vulnerability has been found in Navetti PricePoint 4.6.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection (Blind). The attack can be launched remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component.
A vulnerability was found in Navetti PricePoint 4.6.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component.
A vulnerability was found in Navetti PricePoint 4.6.0.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to basic cross site scripting (Reflected). It is possible to initiate the attack remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component.
A vulnerability was found in Navetti PricePoint 4.6.0.0. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component.