Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Premiere Pro is a timeline-based...
gopass-hibp-1.15.13-1.fc41
FEDORA-2024-40c0ff79e8 Packages in this update: gopass-hibp-1.15.13-1.fc41 Update description: Automatic update for gopass-hibp-1.15.13-1.fc41. Changelog * Tue Jul 9 2024 Mikel Olasagasti Uranga <mikel@olasagasti.info> - 1.15.13-1 -...
freeradius-3.2.5-1.fc39
FEDORA-2024-c395d8fef4 Packages in this update: freeradius-3.2.5-1.fc39 Update description: Update to upstream release 3.2.5 Read More
A Vulnerability in OpenSSH Could Allow for Remote Code Execution
A vulnerability has been discovered in OpenSSH that could allow for remote code execution. OpenSSH is a suite of secure networking utilities based on the...
freeradius-3.2.5-1.fc40
FEDORA-2024-04ba1ff731 Packages in this update: freeradius-3.2.5-1.fc40 Update description: Update to upstream release 3.2.5 Read More
krb5-1.21.3-1.fc41
FEDORA-2024-bdc305fe55 Packages in this update: krb5-1.21.3-1.fc41 Update description: Automatic update for krb5-1.21.3-1.fc41. Changelog * Tue Jul 9 2024 Julien Rische <jrische@redhat.com> - 1.21.3-1 - New...
USN-6887-1: OpenSSH vulnerability
Philippos Giavridis, Jacky Wei En Kung, Daniel Hugenroth, and Alastair Beresford discovered that the OpenSSH ObscureKeystrokeTiming feature did not work as expected. A remote attacker...
USN-6886-1: Go vulnerabilities
It was discovered that the Go net/http module did not properly handle the requests when request's headers exceed MaxHeaderBytes. An attacker could possibly use this...
Progress Telerik Report Server Authentication Bypass Vulnerability
What is the Vulnerability?Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability, allowing an attacker to bypass authentication and create rogue administrator users....
USN-6880-1: Tomcat vulnerability
Sam Shahsavar discovered that Apache Tomcat did not properly reject HTTP requests with an invalid Content-Length header. A remote attacker could possibly use this issue...