python3.9-3.9.19-6.fc40
FEDORA-2024-9a940ffe4c Packages in this update: python3.9-3.9.19-6.fc40 Update description: Security fix for CVE-2024-8088 Read More
python3.9-3.9.19-6.fc41
FEDORA-2024-6140989aaf Packages in this update: python3.9-3.9.19-6.fc41 Update description: Security fix for CVE-2024-8088 Read More
python3.9-3.9.19-6.fc39
FEDORA-2024-dc7f1d57e4 Packages in this update: python3.9-3.9.19-6.fc39 Update description: Security fix for CVE-2024-8088 Read More
mingw-python3-3.11.9-2.fc39
FEDORA-2024-7008b2fedf Packages in this update: mingw-python3-3.11.9-2.fc39 Update description: Add patch for CVE-2024-8088. Update to python-3.11.9. Backport fix for CVE-2024-6923. Read More
mingw-python3-3.11.9-2.fc40
FEDORA-2024-3d656dafe1 Packages in this update: mingw-python3-3.11.9-2.fc40 Update description: Add patch for CVE-2024-8088. Update to python-3.11.9. Backport fix for CVE-2024-6923. Read More
python3.9-3.9.19-6.fc42
FEDORA-2024-0cf8baac55 Packages in this update: python3.9-3.9.19-6.fc42 Update description: Automatic update for python3.9-3.9.19-6.fc42. Changelog * Fri Aug 23 2024 Charalampos Stratakis <cstratak@redhat.com> - 3.9.19-6 - Security...
Versa Director Dangerous File Type Upload Vulnerability (CVE-2024-39717)
What is the Vulnerability?The Versa Director GUI contains a zero-day dangerous file type upload vulnerability (CVE-2024-39717) that allows attackers to upload potentially malicious files, granting...
Re: [SYSS-2024-038] DiCal-RED – Use of Password Hash Instead of Password for Authentication
Posted by J. Hellenthal via Fulldisclosure on Aug 27 Correct me if I'm wrong but I believe he is trying to relay that "on the...
USN-6981-1: Drupal vulnerabilities
It was discovered that Drupal incorrectly sanitized uploaded filenames. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2020-13671) It was discovered...
ZDI-24-1182: Linux Kernel Netfilter Conntrack Type Confusion Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged...