USN-7046-1: Flatpak and Bubblewrap vulnerability
It was discovered that Flatpak incorrectly handled certain persisted directories. An attacker could possibly use this issue to read and write files in locations it...
crosswords-0.3.13.3-4.fc41
FEDORA-2024-851219f5e3 Packages in this update: crosswords-0.3.13.3-4.fc41 Update description: Update to 0.3.13.3 and fix gresource generation Read More
perl-App-cpanminus-1.7047-2.fc39
FEDORA-2024-78e43b4de6 Packages in this update: perl-App-cpanminus-1.7047-2.fc39 Update description: Patch the code to use https instead of http (CVE-2024-45321) Read More
perl-App-cpanminus-1.7047-4.fc40
FEDORA-2024-aaa468ae4f Packages in this update: perl-App-cpanminus-1.7047-4.fc40 Update description: Patch the code to use https instead of http (CVE-2024-45321) Read More
perl-App-cpanminus-1.7047-5.fc41
FEDORA-2024-ef9db8b16d Packages in this update: perl-App-cpanminus-1.7047-5.fc41 Update description: Patch the code to use https instead of http (CVE-2024-45321) Read More
logiops-0.3.5-1.fc39
FEDORA-2024-69ce052378 Packages in this update: logiops-0.3.5-1.fc39 Update description: Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This allows all users on the...
logiops-0.3.5-1.fc40
FEDORA-2024-326390f033 Packages in this update: logiops-0.3.5-1.fc40 Update description: Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This allows all users on the...
logiops-0.3.5-1.fc41
FEDORA-2024-1a9b10c921 Packages in this update: logiops-0.3.5-1.fc41 Update description: Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This allows all users on the...
Backdoor.Win32.Benju.a / Unauthenticated Remote Command Execution
Posted by malvuln on Sep 28 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/88922242e8805bfbc5981e55fdfadd71.txt Contact: malvuln13 () gmail com Media:...
Backdoor.Win32.Prorat.jz / Remote Stack Buffer Overflow (SEH)
Posted by malvuln on Sep 28 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/277f9a4db328476300c4da5f680902ea.txt Contact: malvuln13 () gmail com Media:...