This vulnerability allows remote attackers to bypass authentication on affected installations of Parse Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-39309.
Category Archives: Advisories
DSA-5725-1 znc – security update
Johannes Kuhn discovered that messages and channel names are not
properly escaped in the modtcl module in ZNC, a IRC bouncer, which could
result in remote code execution via specially crafted messages.
USN-6860-1: OpenVPN vulnerabilities
Reynir Björnsson discovered that OpenVPN incorrectly handled terminating
client connections. A remote authenticated client could possibly use this
issue to keep the connection active, bypassing certain security policies.
This issue only affected Ubuntu 23.10, and Ubuntu 24.04 LTS.
(CVE-2024-28882)
Reynir Björnsson discovered that OpenVPN incorrectly handled certain
control channel messages with nonprintable characters. A remote attacker
could possibly use this issue to cause OpenVPN to consume resources, or
fill up log files with garbage, leading to a denial of service.
(CVE-2024-5594)
onnx-1.14.1-3.fc40
FEDORA-2024-d9c7181a19
Packages in this update:
onnx-1.14.1-3.fc40
Update description:
Security fix for CVE-2024-5187
squid-6.10-1.fc40
FEDORA-2024-110b39017e
Packages in this update:
squid-6.10-1.fc40
Update description:
version update
security update
squid-6.10-1.fc39
FEDORA-2024-8ca9261bdd
Packages in this update:
squid-6.10-1.fc39
Update description:
version update
security update
wordpress-6.5.5-1.fc39
FEDORA-2024-89d685e856
Packages in this update:
wordpress-6.5.5-1.fc39
Update description:
WordPress 6.5.5 Maintenance & Security Release
Security updates included in this release
The security team would like to thank the following people for responsibly reporting vulnerabilities, and allowing them to be fixed in this release:
A cross-site scripting (XSS) vulnerability affecting the HTML API reported by Dennis Snell of the WordPress Core Team, along with Alex Concha and Grzegorz (Greg) Ziółkowski of the WordPress security team.
A cross-site scripting (XSS) vulnerability affecting the Template Part block reported independently by Rafie Muhammad of Patchstack and during a third party security audit.
A path traversal issue affecting sites hosted on Windows reported independently by Rafie M & Edouard L of Patchstack, David Fifield, x89, apple502j, and mishre.
See also the Upstream announcement
wordpress-6.5.5-1.fc40
FEDORA-2024-6a4ffde369
Packages in this update:
wordpress-6.5.5-1.fc40
Update description:
WordPress 6.5.5 Maintenance & Security Release
Security updates included in this release
The security team would like to thank the following people for responsibly reporting vulnerabilities, and allowing them to be fixed in this release:
A cross-site scripting (XSS) vulnerability affecting the HTML API reported by Dennis Snell of the WordPress Core Team, along with Alex Concha and Grzegorz (Greg) Ziółkowski of the WordPress security team.
A cross-site scripting (XSS) vulnerability affecting the Template Part block reported independently by Rafie Muhammad of Patchstack and during a third party security audit.
A path traversal issue affecting sites hosted on Windows reported independently by Rafie M & Edouard L of Patchstack, David Fifield, x89, apple502j, and mishre.
See also the Upstream announcement
wordpress-6.5.5-1.el9
FEDORA-EPEL-2024-e1546d5caf
Packages in this update:
wordpress-6.5.5-1.el9
Update description:
WordPress 6.5.5 Maintenance & Security Release
Security updates included in this release
The security team would like to thank the following people for responsibly reporting vulnerabilities, and allowing them to be fixed in this release:
A cross-site scripting (XSS) vulnerability affecting the HTML API reported by Dennis Snell of the WordPress Core Team, along with Alex Concha and Grzegorz (Greg) Ziółkowski of the WordPress security team.
A cross-site scripting (XSS) vulnerability affecting the Template Part block reported independently by Rafie Muhammad of Patchstack and during a third party security audit.
A path traversal issue affecting sites hosted on Windows reported independently by Rafie M & Edouard L of Patchstack, David Fifield, x89, apple502j, and mishre.
See also the Upstream announcement
openssh-9.6p1-1.fc40.4
FEDORA-2024-dc89a2e1bf
Packages in this update:
openssh-9.6p1-1.fc40.4
Update description:
Backport fix for CVE-2024-6387 (rhbz#2294879)
Backport fix for ObscureKeystrokeTiming logic error from OpenSSH 9.8