USN-6141-1: xfce4-settings vulnerability
Robin Peraglie and Johannes Moritz discovered that xfce4-settings incorrectly parsed quoted input when processed through xdg-open. A remote attacker could possibly use this issue to...
USN-6140-1: Go vulnerabilities
It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting...
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Google Chrome is a web browser used to access the...
python-django-filter-23.2-1.fc38
FEDORA-2023-4dee6d0a76 Packages in this update: python-django-filter-23.2-1.fc38 Update description: New upstream version Read More
CVE-2017-20185
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Fuzzy SWMP. It has been rated as problematic. This issue...
CVE-2015-10117
A vulnerability, which was classified as problematic, was found in Gravity Forms DPS PxPay Plugin up to 1.4.2 on WordPress. Affected is an unknown function....
CVE-2015-10116
A vulnerability classified as problematic has been found in RealFaviconGenerator Favicon Plugin up to 1.2.12 on WordPress. This affects the function install_new_favicon of the file...
Zyxel Multiple Firewall Vulnerabilities
What is Zyxel Networks? The Zyxel Networks is one of the leading providers of broadband networking solution for small and home offices. What is the...
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system...
CVE-2013-10030
A vulnerability, which was classified as problematic, has been found in Exit Box Lite Plugin up to 1.06 on WordPress. Affected by this issue is...