ZDI-24-417: Xiaomi Pro 13 isUrlMatchLevel Permissive List of Allowed Inputs Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xiaomi Pro 13 smartphones. User interaction is required to exploit this vulnerability...
et-6.2.8-1.fc38
FEDORA-2024-bd9e67c117 Packages in this update: et-6.2.8-1.fc38 Update description: Update to 6.2.8, fixing CVE-2022-48257 and CVE-2022-48258 Unbundle cpp-httlib, fixing CVE-2023-26130 Read More
et-6.2.8-1.el9
FEDORA-EPEL-2024-90aea0505b Packages in this update: et-6.2.8-1.el9 Update description: Update to 6.2.8, fixing CVE-2022-48257 and CVE-2022-48258 Read More
et-6.2.8-1.fc40
FEDORA-2024-b745c97f4b Packages in this update: et-6.2.8-1.fc40 Update description: Update to 6.2.8, fixing CVE-2022-48257 and CVE-2022-48258 Unbundle cpp-httlib, fixing CVE-2023-26130 Read More
et-6.2.8-1.fc39
FEDORA-2024-94a155818c Packages in this update: et-6.2.8-1.fc39 Update description: Update to 6.2.8, fixing CVE-2022-48257 and CVE-2022-48258 Unbundle cpp-httlib, fixing CVE-2023-26130 Read More
USN-6760-1: Gerbv vulnerability
George-Andrei Iosif and David Fernandez Gonzalez discovered that Gerbv did not properly initialize a data structure when parsing certain nested RS-274X format files. If a...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code...
R-4.3.3-2.fc39
FEDORA-2024-07b7b83a4f Packages in this update: R-4.3.3-2.fc39 Update description: Security fix for CVE-2024-27322 Read More
R-4.3.3-2.fc38
FEDORA-2024-bc590cb3f1 Packages in this update: R-4.3.3-2.fc38 Update description: Security fix for CVE-2024-27322 Read More
LSN-0103-1: Kernel Live Patch Security Notice
Lonial Con discovered that the netfilter subsystem in the Linux kernel contained a memory leak when handling certain element flush operations. A local attacker could...