USN-5456-1: ImageMagick vulnerability
It was discovered that ImageMagick incorrectly handled memory under certain circumstances. If a user were tricked into opening a specially crafted image, an attacker could...
LSN-0086-1: Kernel Live Patch Security Notice
It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker...
A Vulnerability in Microsoft Support Diagnostic Tool (MSDT) Could Allow for Arbitrary Code Execution
A vulnerability in Microsoft Support Diagnostic Tool (MSDT) could allow for arbitrary code execution. MSDT collects information from hosts running Microsoft Windows and Windows Server...
USN-5457-1: WebKitGTK vulnerabilities
A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website,...
thunderbird-91.10.0-1.fc35
FEDORA-2022-3482bd98e6 Packages in this update: thunderbird-91.10.0-1.fc35 Update description: Update to 91.10.0 See https://www.mozilla.org/en-US/security/advisories/mfsa2022-22/ Update to 91.9.1 Read More
mutt-2.2.5-1.fc36
FEDORA-2022-f1a8f72bb8 Packages in this update: mutt-2.2.5-1.fc36 Update description: Upgrade to 2.3.5 Upgrade to 2.2.3 Read More
thunderbird-91.10.0-1.fc36
FEDORA-2022-a5d22b5dd8 Packages in this update: thunderbird-91.10.0-1.fc36 Update description: Update to 91.10.0 See https://www.mozilla.org/en-US/security/advisories/mfsa2022-22/ Read More
CVE-2022-1285
Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.8. Read More
ZDI-22-810: Microsoft Windows Installer Service Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code...
ZDI-22-809: Microsoft Excel XLS File Parsing Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that...