CVE-2021-26628
Insufficient script validation of the admin page enables XSS, which causes unauthorized users to steal admin privileges. When uploading file in a specific menu, the...
USN-5389-1: Libcroco vulnerabilities
It was discovered that Libcroco was incorrectly accessing data structures when reading bytes from memory, which could cause a heap buffer overflow. An attacker could...
USN-5390-1: Linux kernel vulnerabilities
David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this...
USN-5388-2: OpenJDK vulnerabilities
It was discovered that OpenJDK incorrectly verified ECDSA signatures. An attacker could use this issue to bypass the signature verification process. (CVE-2022-21449) It was discovered...
USN-5388-1: OpenJDK vulnerabilities
It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly use this issue to cause a...
Post Title
A vulnerability has been discovered in specific WSO2 products, which could allow for remote code execution. WSO2 is an open-source technology provider. It offers an...
recutils-1.9-1.fc36
FEDORA-2022-17787e290f Packages in this update: recutils-1.9-1.fc36 Update description: New upstream release (#2075962, #2047809, #2047807, #2047805, #2046941) Use %%gpgverify macro Remove recutils-shared-lib-calls-exit.patch Install rec-mode.el from a...
recutils-1.9-1.fc35
FEDORA-2022-4e6bd7ca62 Packages in this update: recutils-1.9-1.fc35 Update description: New upstream release (#2075962, #2047809, #2047807, #2047805, #2046941) Use %%gpgverify macro Remove recutils-shared-lib-calls-exit.patch Install rec-mode.el from a...
USN-5376-3: Git regression
USN-5376-1 fixed vulnerabilities in Git, some patches were missing to properly fix the issue. This update fixes the problem. Original advisory details: 俞晨东 discovered that...
USN-5387-1: Barbican vulnerabilities
Douglas Mendizábal discovered that Barbican incorrectly handled access restrictions. An authenticated attacker could possibly use this issue to consume protected resources and possibly cause a...