USN-5365-1: H2 vulnerabilities
It was discovered that H2 was vulnerable to deserialization of untrusted data. An attacker could possibly use this issue to execute arbitrary code. (CVE-2021-42392) It...
openscad-2021.01-8.fc35
FEDORA-2022-3012e64f8c Packages in this update: openscad-2021.01-8.fc35 Update description: Security fixes for CVE-2022-0496 and CVE-2022-0497 Read More
openscad-2021.01-8.fc34
FEDORA-2022-1961907229 Packages in this update: openscad-2021.01-8.fc34 Update description: Security fixes for CVE-2022-0496 and CVE-2022-0497 Read More
openscad-2021.01-8.fc36
FEDORA-2022-1cf6eefd62 Packages in this update: openscad-2021.01-8.fc36 Update description: Security fixes for CVE-2022-0496 and CVE-2022-0497 Read More
openscad-2021.01-8.fc37
FEDORA-2022-2e64749f77 Packages in this update: openscad-2021.01-8.fc37 Update description: Automatic update for openscad-2021.01-8.fc37. Changelog * Tue Apr 5 2022 LumÃr Balhar <lbalhar@redhat.com> - 2021.01-8 - Security...
Post Title
Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is...
USN-5364-1: Waitress vulnerability
It was discovered that Waitress incorrectly handled certain requests. An attacker could possibly use this issue to expose sensitive information. Read More
community-mysql-8.0.28-1.fc35
FEDORA-2022-be015e0331 Packages in this update: community-mysql-8.0.28-1.fc35 Update description: MySQL 8.0.28 Release notes: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-28.html Read More
community-mysql-8.0.28-1.fc34
FEDORA-2022-43217f0ba7 Packages in this update: community-mysql-8.0.28-1.fc34 Update description: MySQL 8.0.28 Release notes: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-28.html Read More
ZDI-22-547: (0Day) (Pwn2Own) Samsung Galaxy S21 Exposed Dangerous Method Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 phones. An attacker must first obtain the ability to...