httpd-2.4.53-1.fc36
FEDORA-2022-78e3211c55 Packages in this update: httpd-2.4.53-1.fc36 Update description: new version httpd 2.4.53 fixes CVE-2022-23943, CVE-2022-22721, CVE-2022-22720 and CVE-2022-22719 Read More
httpd-2.4.53-1.fc35
FEDORA-2022-b4103753e9 Packages in this update: httpd-2.4.53-1.fc35 Update description: new version httpd 2.4.53 fixes CVE-2022-23943, CVE-2022-22721, CVE-2022-22720 and CVE-2022-22719 Read More
CVE-2020-15591
fexsrv in F*EX (aka Frams' Fast File EXchange) before fex-20160919_2 allows eval injection (for unauthenticated remote code execution). Read More
USN-5332-2: Bind vulnerability
USN-5332-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: Xiang Li,...
USN-5321-2: Firefox vulnerabilities
USN-5321-1 fixed vulnerabilities in Firefox. The update didn't include arm64 because of a regression. This update provides the corresponding update for arm64. This update also...
USN-5334-1: man-db vulnerability
It was discovered that man-db incorrectly handled permission changing operations in its daily cron job, and was therefore affected by a race condition. An attacker...
CVE-2021-23556
The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus...
kernel-5.16.15-101.fc34
FEDORA-2022-9342e59a98 Packages in this update: kernel-5.16.15-101.fc34 Update description: The 5.16.15 stable kernel update includes a number of important fixes across the tree. It also includes...
kernel-5.16.15-201.fc35
FEDORA-2022-de4474b89d Packages in this update: kernel-5.16.15-201.fc35 Update description: The 5.16.15 stable kernel update includes a number of important fixes across the tree. It also includes...
USN-5333-1: Apache HTTP Server vulnerabilities
Chamal De Silva discovered that the Apache HTTP Server mod_lua module incorrectly handled certain crafted request bodies. A remote attacker could possibly use this issue...