jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
Category Archives: Advisories
wordpress-5.9.2-1.fc35
FEDORA-2022-956b6078fb
Packages in this update:
wordpress-5.9.2-1.fc35
Update description:
WordPress 5.9.2 Security & Maintenance Release
wordpress-5.9.2-1.el9
FEDORA-EPEL-2022-e53465729d
Packages in this update:
wordpress-5.9.2-1.el9
Update description:
WordPress 5.9.2 Security & Maintenance Release
wordpress-5.9.2-1.fc36
FEDORA-2022-706aac2786
Packages in this update:
wordpress-5.9.2-1.fc36
Update description:
WordPress 5.9.2 Security & Maintenance Release
wordpress-5.8.4-1.fc34
FEDORA-2022-4b3079c1be
Packages in this update:
wordpress-5.8.4-1.fc34
Update description:
WordPress 5.8.4 Security Release
wordpress-5.1.13-1.el7
FEDORA-EPEL-2022-e1430e72de
Packages in this update:
wordpress-5.1.13-1.el7
Update description:
WordPress 5.1.13 Security Release
ZDI-22-508: Cisco Nexus Dashboard Fabric Controller XML External Entity Processing Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Cisco Nexus Dashboard Fabric Controller. Authentication is not required to exploit this vulnerability.
ZDI-22-507: Cisco Nexus Dashboard Fabric Controller Improper Privilege Management Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Cisco Nexus Dashboard Fabric Controller. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
ZDI-22-506: Cisco Nexus Dashboard Fabric Controller AMF Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco Nexus Dashboard Fabric Controller. Authentication is not required to exploit this vulnerability.
ZDI-22-505: Autodesk AutoCAD PCX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.