IBM Cognos Analytics PowerPlay (IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7) could be vulnerable to an XML Bomb attack by a malicious authenticated user. IBM X-Force ID: 196813.
Category Archives: Advisories
CVE-2020-14123
There is a pointer double free vulnerability in Some MIUI Services. When a function is called, the memory pointer is copied to two function modules, and an attacker can cause the pointer to be repeatedly released through malicious operations, resulting in the affected module crashing and affecting normal functionality, and if successfully exploited the vulnerability can cause elevation of privileges.
usd-21.11-11.fc35
FEDORA-2022-61f6ee6353
Packages in this update:
usd-21.11-11.fc35
Update description:
Security fix for CVE-2022-28041
vim-8.2.4804-1.fc34
FEDORA-2022-b605768c94
Packages in this update:
vim-8.2.4804-1.fc34
Update description:
The newest upstream commit
Security fixes for CVE-2022-1381, CVE-2022-1420
vim-8.2.4804-1.fc35
FEDORA-2022-e304fffd34
Packages in this update:
vim-8.2.4804-1.fc35
Update description:
The newest upstream commit
Security fixes for CVE-2022-1381, CVE-2022-1420
vim-8.2.4804-1.fc36
FEDORA-2022-b43cbc3d2e
Packages in this update:
vim-8.2.4804-1.fc36
Update description:
The newest upstream commit
Security fixes for CVE-2022-1381, CVE-2022-1420
CVE-2022-22718 on CISA’s Known Exploited Vulnerabilities Catalog
FortiGuard Labs is aware that the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2022-22718 to the Known Exploited Vulnerabilities Catalog. CVE-2022-24481 is a local privilege escalation vulnerability in the Windows Print Spooler and affects multiple versions of Windows OS. Microsoft issued a patch for the vulnerability as part of the February 2022 Patch Tuesday updates.Why is this Significant?This is significant because CISA’s Known Exploited Vulnerabilities Catalog lists vulnerabilities that are known to be exploited in the wild. Although Microsoft rated CVE-2022-22718 as “Exploitation More Likely” in their advisory, the vulnerability is now on the active exploitation list as such the patch for CVE-2022-22718 should be applied as soon as possible.What is CVE-2022-22718?CVE-2022-22718 is a local privilege escalation vulnerability in the Windows Print Spooler and affects multiple versions of Windows OS. Successfully exploiting the vulnerability allows a local attacker to elevate privileges. CVE-2022-22718 has a CVSS score of 7.8. Has Microsoft Released an Advisory for CVE-2022-22718?Yes, Microsoft released an advisory on February 8, 2022. See the Appendix for a link to “Windows Print Spooler Elevation of Privilege Vulnerability – CVE-2022-22718”.Has Microsoft Released a Patch for CVE-2022-22718?Yes, Microsoft released a patch as part of the February 2022 Patch Tuesday (February 8th, 2022).What is the Status of Coverage?FortiGuard Labs has the following IPS signature against CVE-2022-22718:MS.Windows.Print.Spooler.CVE-2022-22718.Privilege.Elevation
epiphany-40.6-2.fc34
FEDORA-2022-22b85a45cb
Packages in this update:
epiphany-40.6-2.fc34
Update description:
Fix CVE-2022-29536
epiphany-42.2-1.fc36
FEDORA-2022-88690c6188
Packages in this update:
epiphany-42.2-1.fc36
Update description:
Update to 42.2, fixes CVE-2022-29536
epiphany-41.4-1.fc35
FEDORA-2022-ad26447c98
Packages in this update:
epiphany-41.4-1.fc35
Update description:
Update to 41.4, fixes CVE-2022-29536