Category Archives: Advisories

vim-8.2.4701-1.fc35

Read Time:9 Second

FEDORA-2022-d776fcfe60

Packages in this update:

vim-8.2.4701-1.fc35

Update description:

The newest upstream commit

Security fix for CVE-2022-1160

Security fix for CVE-2022-1154

Read More

Post Title

Read Time:13 Second

A vulnerability has been discovered in FortiWAN which could allow for arbitrary code execution. FortiWAN is a product that balances traffic over multiple WAN connections. Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary code using specially crafted requests.

Read More

vim-8.2.4701-1.fc36

Read Time:9 Second

FEDORA-2022-44f5b2df35

Packages in this update:

vim-8.2.4701-1.fc36

Update description:

The newest upstream commit

Security fix for CVE-2022-1160

Security fix for CVE-2022-1154

Read More

USN-5366-1: FriBidi vulnerabilities

Read Time:38 Second

It was discovered that FriBidi incorrectly handled processing of input strings
resulting in memory corruption. An attacker could use this issue to cause
FriBidi to crash, resulting in a denial of service, or potentially execute
arbitrary code.
(CVE-2022-25308)

It was discovered that FriBidi incorrectly validated input data to its CapRTL
unicode encoder, resulting in memory corruption. An attacker could use this
issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code.
(CVE-2022-25309)

It was discovered that FriBidi incorrectly handled empty input when removing
marks from unicode strings, resulting in a crash. An attacker could use this
to cause FriBidi to crash, resulting in a denial of service, or potentially
execute arbitrary code.
(CVE-2022-25310)

Read More

CVE-2020-22253

Read Time:14 Second

Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device.

Read More