K84262603: Multiple Ruby vulnerabilities

Multiple Ruby vulnerabilities Security Advisory Security Advisory Description CVE-2018-1000073 RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 ... More info: https://support.f5.com/csp/article/K84262603?utm_source=f5support&utm_medium=RSS

K15244523: 389-ds-base vulnerability CVE-2021-4091

389-ds-base vulnerability CVE-2021-4091 Security Advisory Security Advisory Description A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An ... More info: https://support.f5.com/csp/article/K15244523?utm_source=f5support&utm_medium=RSS

Drupal core – Moderately critical – Improper input validation – SA-CORE-2022-008

Project: Drupal coreDate: 2022-April-20Security risk: Moderately critical 12∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Improper input validationDescription: Drupal cores form API has a vulnerability where certain contributed or custom modules forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or More info: https://www.drupal.org/sa-core-2022-008

Drupal core – Moderately critical – Access bypass – SA-CORE-2022-009

Project: Drupal coreDate: 2022-April-20Security risk: Moderately critical 13∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Access bypassDescription: Drupal 9.3 implemented a generic entity access API for entity revisions. However, this API was not completely integrated with existing permissions, resulting in some possible access bypass for users who have access to use revisions of content generally, but who do not have access to individual items of node and More info: https://www.drupal.org/sa-core-2022-009

K05122252: Bash vulnerability CVE-2012-6711

Bash vulnerability CVE-2012-6711 Security Advisory Security Advisory Description A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current ... More info: https://support.f5.com/csp/article/K05122252?utm_source=f5support&utm_medium=RSS
Translate »