FEDORA-2024-5b487ca10a
Packages in this update:
cjson-1.7.17-1.fc38
Update description:
Update to latest upstream version 1.7.17 (closes rhbz#2255953)
cjson-1.7.17-1.fc38
Update to latest upstream version 1.7.17 (closes rhbz#2255953)
cjson-1.7.17-1.fc39
Update to latest upstream version 1.7.17 (closes rhbz#2255953)
cjson-1.7.17-1.fc40
Update to latest upstream version 1.7.17 (closes rhbz#2255953)
cjson-1.7.17-1.fc41
Automatic update for cjson-1.7.17-1.fc41.
* Sun Apr 7 2024 Fabian Affolter <mail@fabian-affolter.ch> – 1.7.17.-1
– Update to latest upstream version 1.7.17 (closes rhbz#2255953)
– Fix rhbz#2254647
python-mechanicalsoup-1.3.0-1.fc41
Automatic update for python-mechanicalsoup-1.3.0-1.fc41.
* Sun Apr 7 2024 Fabian Affolter <mail@fabian-affolter.ch> – 1.3.0-1
– Update to latest upstream version 1.3.0 (closes rhbz#2219697)
– Fix rhbz#2219756, rhbz#2261581 and rhbz#2232585
Posted by Andrew Zayine on Apr 05
Dear Colleagues,
IEEE CSR Workshop on Cyber Forensics and Advanced Threat Investigations in
Emerging Technologies organizing committee is inviting you to submit your
research papers. The workshop will be held in Hybrid mode. The in-person
mode will held at Hilton London Tower Bridge, London from 2 to 4 September
2024
Topics include (but not limited to):
-Forensics and threat investigations in P2P, cloud/edge, SDN/NFV, VPN, and
social networks…
Posted by malvuln on Apr 05
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/0e6e40aad3e8d46e3c0c26ccc6ab94b3.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Agent.ju (PSYRAT)
Vulnerability: Authentication Bypass RCE
Family: PSYRAT
Type: PE32
MD5: 0e6e40aad3e8d46e3c0c26ccc6ab94b3
Vuln ID: MVID-2024-0677
Disclosure: 04/01/2024
Description: The PsyRAT 0.01 malware listens on…
Posted by Valentin Lobstein via Fulldisclosure on Apr 05
CVE ID: CVE-2024-30929
Description:
A Cross-Site Scripting (XSS) vulnerability has been found in DerbyNet version 9.0, affecting the `playlist.php`
component. This issue allows remote attackers to execute arbitrary code by exploiting the `back` parameter. The
application does not properly sanitize the `back` parameter before it is rendered on the page, thereby allowing the
injection and execution of arbitrary JavaScript code.
Vulnerability…
Posted by Valentin Lobstein via Fulldisclosure on Apr 05
CVE ID: CVE-2024-30928
Description:
An SQL Injection vulnerability has been discovered in DerbyNet version 9.0, particularly within the
`ajax/query.slide.next.inc` file. This vulnerability allows remote attackers to execute arbitrary code and disclose
sensitive information by exploiting the unvalidated `classids` parameter used in constructing SQL queries. This
parameter is not properly sanitized before being included in the SQL statement,…
Posted by Valentin Lobstein via Fulldisclosure on Apr 05
CVE ID: CVE-2024-30927
Description:
A Cross-Site Scripting (XSS) vulnerability is present in DerbyNet version 9.0, specifically within the
`racer-results.php` component. This issue allows remote attackers to execute arbitrary code through the improper
handling of the `racerid` parameter. The vulnerability is notably present within the HTML `<title>` tag, where the
`racerid` parameter value is dynamically inserted directly into the page…