libcaca-0.99-0.40.beta20.el7

Read Time:16 Second

FEDORA-EPEL-2022-03421505cb

Packages in this update:

libcaca-0.99-0.40.beta20.el7

Update description:

Clean up SPEC file.
Update to beta20.
CVE-2018-20545, CVE-2018-20546, CVE-2018-20547, CVE-2018-20548, CVE-2018-20549 (#1687860).
CVE-2021-30498 (#1948677).
CVE-2021-30499 (#1948681).
CVE-2021-3410 (#1931971).

Read More

libcaca-0.99-0.59.beta20.el8

Read Time:16 Second

FEDORA-EPEL-2022-42af0c4375

Packages in this update:

libcaca-0.99-0.59.beta20.el8

Update description:

Clean up SPEC file.
Update to beta20.
CVE-2018-20545, CVE-2018-20546, CVE-2018-20547, CVE-2018-20548, CVE-2018-20549 (#1687860).
CVE-2021-30498 (#1948677).
CVE-2021-30499 (#1948681).
CVE-2021-3410 (#1931971).

Read More

Post Title

Read Time:23 Second

Multiple vulnerabilities have been discovered in Veeam Backup & Replication that could allow for remote code execution. Veeam Backup & Replication is a backup solutions for virtual environments. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of the application. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Read More

USN-5325-1: Zsh vulnerabilities

Read Time:14 Second

Sam Foxman discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this issue to regain dropped privileges.
(CVE-2019-20044)

It was discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-45444)

Read More

CVE-2021-24950

Read Time:23 Second

The Insight Core WordPress plugin through 1.0 does not have any authorisation and CSRF checks in the insight_customizer_options_import (available to any authenticated user), does not validate user input before passing it to unserialize(), nor sanitise and escape it before outputting it in the response. As a result, it could allow users with a role as low as Subscriber to perform PHP Object Injection, as well as Stored Cross-Site Scripting attacks

Read More

News, Advisories and much more

Exit mobile version