python-ujson-5.4.0-1.el9
FEDORA-EPEL-2022-1026769ad3 Packages in this update: python-ujson-5.4.0-1.el9 Update description: Security fix for CVE-2022-31116 and CVE-2022-31117. 5.4.0 Added Add support for arbitrary size integers Fixed CVE-2022-31116: Replace...
python-ujson-5.4.0-1.fc36
FEDORA-2022-1b2b8d5177 Packages in this update: python-ujson-5.4.0-1.fc36 Update description: Security fix for CVE-2022-31116 and CVE-2022-31117. 5.4.0 Added Add support for arbitrary size integers Fixed CVE-2022-31116: Replace...
CVE-2020-14127
A denial of service vulnerability exists in some Xiaomi models of phones. The vulnerability is caused by heap overflow and can be exploited by attackers...
grafana-9.0.2-3.fc37
FEDORA-2022-6480e61dad Packages in this update: grafana-9.0.2-3.fc37 Update description: Automatic update for grafana-9.0.2-3.fc37. Changelog * Thu Jul 14 2022 Andreas Gerstmayr <agerstmayr@redhat.com> 9.0.2-3 - fix quoting...
USN-5520-1: HTTP-Daemon vulnerability
It was discovered that HTTP-Daemon incorrectly handled certain crafted requests. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack....
USN-5519-1: Python vulnerability
It was discovered that Python incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. Read More
python-notebook-6.4.11-3.fc37
FEDORA-2022-f9e459c893 Packages in this update: python-notebook-6.4.11-3.fc37 Update description: Automatic update for python-notebook-6.4.11-3.fc37. Changelog * Wed Jul 13 2022 Miro HronĨok <mhroncok@redhat.com> - 6.4.11-3 - Fix...
USN-5512-1: Thunderbird vulnerabilities
Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could...
CVE-2017-20129
A vulnerability was found in LogoStore. It has been classified as critical. Affected is an unknown function of the file /LogoStore/search.php. The manipulation of the...
ZDI-22-1009: Adobe InCopy Font Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe InCopy. User interaction is required to exploit this vulnerability in that...