FreshRSS

πŸ”’
☐ β˜† βœ‡ Exploit-DB Updates

[remote] TitanNit Web Control 2.01 / Atemio 7600 - Root Remote Code Execution

March 3rd 2024 at 00:00
TitanNit Web Control 2.01 / Atemio 7600 - Root Remote Code Execution
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Simple Student Attendance System v1.0 - 'classid' Time Based Blind & Union Based SQL Injection

March 3rd 2024 at 00:00
Simple Student Attendance System v1.0 - 'classid' Time Based Blind & Union Based SQL Injection
☐ β˜† βœ‡ Exploit-DB Updates

[webapps] Easywall 0.3.1 - Authenticated Remote Command Execution

March 3rd 2024 at 00:00
Easywall 0.3.1 - Authenticated Remote Command Execution
☐ β˜† βœ‡ Exploit-DB Updates

[local] A-PDF All to MP3 Converter 2.0.0 - DEP Bypass via HeapCreate + HeapAlloc

March 3rd 2024 at 00:00
A-PDF All to MP3 Converter 2.0.0 - DEP Bypass via HeapCreate + HeapAlloc
☐ β˜† βœ‡ Exploit-DB Updates

[remote] TPC-110W - Missing Authentication for Critical Function

March 3rd 2024 at 00:00
TPC-110W - Missing Authentication for Critical Function
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Simple Student Attendance System v1.0 - Time Based Blind SQL Injection

March 3rd 2024 at 00:00
Simple Student Attendance System v1.0 - Time Based Blind SQL Injection
☐ β˜† βœ‡ Exploit-DB Updates

[remote] GL.iNet AR300M v4.3.7 Remote Code Execution - CVE-2023-46454 Exploit

March 3rd 2024 at 00:00
GL.iNet AR300M v4.3.7 Remote Code Execution - CVE-2023-46454 Exploit
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Petrol Pump Management Software v1.0 - 'Address' Stored Cross Site Scripting

March 3rd 2024 at 00:00
Petrol Pump Management Software v1.0 - 'Address' Stored Cross Site Scripting
☐ β˜† βœ‡ Exploit-DB Updates

[local] Windows PowerShell - Event Log Bypass Single Quote Code Execution

March 3rd 2024 at 00:00
Windows PowerShell - Event Log Bypass Single Quote Code Execution
☐ β˜† βœ‡ Exploit-DB Updates

[webapps] Magento ver. 2.4.6 - XSLT Server Side Injection

March 3rd 2024 at 00:00
Magento ver. 2.4.6 - XSLT Server Side Injection
☐ β˜† βœ‡ Exploit-DB Updates

[remote] R Radio Network FM Transmitter 1.07 system.cgi - Password Disclosure

March 3rd 2024 at 00:00
R Radio Network FM Transmitter 1.07 system.cgi - Password Disclosure
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Maxima Max Pro Power - BLE Traffic Replay (Unauthenticated)

March 3rd 2024 at 00:00
Maxima Max Pro Power - BLE Traffic Replay (Unauthenticated)
☐ β˜† βœ‡ Exploit-DB Updates

[remote] AC Repair and Services System v1.0 - Multiple SQL Injection

March 3rd 2024 at 00:00
AC Repair and Services System v1.0 - Multiple SQL Injection
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Enrollment System v1.0 - SQL Injection

March 3rd 2024 at 00:00
Enrollment System v1.0 - SQL Injection
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Real Estate Management System v1.0 - Remote Code Execution via File Upload

March 3rd 2024 at 00:00
Real Estate Management System v1.0 - Remote Code Execution via File Upload
☐ β˜† βœ‡ Exploit-DB Updates

[remote] GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit

March 3rd 2024 at 00:00
GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit
☐ β˜† βœ‡ Exploit-DB Updates

[remote] GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit

March 3rd 2024 at 00:00
GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Petrol Pump Management Software v.1.0 - Stored Cross Site Scripting via SVG file

March 3rd 2024 at 00:00
Petrol Pump Management Software v.1.0 - Stored Cross Site Scripting via SVG file
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload

March 3rd 2024 at 00:00
Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload
☐ β˜† βœ‡ Exploit-DB Updates

[remote] Petrol Pump Management Software v.1.0 - SQL Injection

March 3rd 2024 at 00:00
Petrol Pump Management Software v.1.0 - SQL Injection
☐ β˜† βœ‡ Exploit-DB Updates

[webapps] Boss Mini 1.4.0 - local file inclusion

March 3rd 2024 at 00:00
Boss Mini 1.4.0 - local file inclusion
☐ β˜† βœ‡ Full Disclosure

JetStream Smart Switch - TL-SG2210P v5.0/ Improper Access Control / CVE-2023-43318

March 3rd 2024 at 00:54

Posted by Shaikh Shahnawaz on Mar 02

[+] Credits: Shahnawaz Shaikh, Security Researcher at Cybergate Defense LLC
[+] twitter.com/_striv3r_

[Vendor]
Tp-Link (http://tp-link.com)

[Product]
JetStream Smart Switch - TL-SG2210P v5.0 Build 20211201

[Vulnerability Type]
Improper Access Control

[Affected Product Code Base]
JetStream Smart Switch - TL-SG2210P v5.0 Build 20211201

[Affected Component]
usermanagement, swtmactablecfg endpoints of webconsole

[CVE Reference]
CVE-2023-43318...
☐ β˜† βœ‡ Full Disclosure

SEC Consult SA-20240226-0 :: Local Privilege Escalation via DLL Hijacking in Qognify VMS Client Viewer

March 3rd 2024 at 00:54

Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Mar 02

SEC Consult Vulnerability Lab Security Advisory < 20240226-0 >
=======================================================================
title: Local Privilege Escalation via DLL Hijacking
product: Qognify VMS Client Viewer
vulnerable version: >=7.1
fixed version: see solution
CVE number: CVE-2023-49114
impact: medium
homepage: https://www.qognify.com/...
☐ β˜† βœ‡ Full Disclosure

XAMPP 5.6.40 - Error Based SQL Injection

March 3rd 2024 at 00:53

Posted by Andrey Stoykov on Mar 02

# Exploit Title: XAMPP - Error Based SQL Injection
# Date: 02/2024
# Exploit Author: Andrey Stoykov
# Version: 5.6.40
# Tested on: Ubuntu 22.04
# Blog: http://msecureltd.blogspot.com

Steps to Reproduce:

1. Login to phpmyadmin
2. Visit Export > New Template > test > Create
3. Navigate to "Existing Templates"
4. Select template "test" and click "Update"
5. Trap HTTP POST request
6. Place single quote to...
☐ β˜† βœ‡ Full Disclosure

Multiple XSS Issues in boidcmsv2.0.1

March 3rd 2024 at 00:53

Posted by Andrey Stoykov on Mar 02

# Exploit Title: Multiple XSS Issues in boidcmsv2.0.1
# Date: 3/2024
# Exploit Author: Andrey Stoykov
# Version: 2.0.1
# Tested on: Ubuntu 22.04
# Blog: http://msecureltd.blogspot.com

XSS via SVG File Upload

Steps to Reproduce:

1. Login with admin user
2. Visit "Media" page
3. Upload xss.svg
4. Click "View" and XSS payload will execute

// xss.svg contents

<?xml version="1.0" standalone="no"?>...
☐ β˜† βœ‡ Full Disclosure

BACKDOOR.WIN32.ARMAGEDDON.R / Hardcoded Cleartext Credentials

March 3rd 2024 at 00:52

Posted by malvuln on Mar 02

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/68d135936512e88cc0704b90bb3839e0.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Armageddon.r
Vulnerability: Hardcoded Cleartext Credentials
Description: The malware listens on TCP port 5859 and requires
authentication. The password "KOrUPtIzEre" is stored in cleartext within
the PE file at...
☐ β˜† βœ‡ Full Disclosure

Multilaser Router - Access Control Bypass through Cookie Manipulation - CVE-2023-38946

March 3rd 2024 at 00:52

Posted by VinΓ­cius Moraes on Mar 02

=====[Tempest Security Intelligence - Security Advisory -
CVE-2023-38946]=======

Access Control Bypass in Multilaser router's Web Management Interface

Author: Vinicius Moraes < vinicius.moraes.w () gmail com >

=====[Table of
Contents]========================================================

1. Overview
2. Detailed description
3. Other contexts & solutions
4. Acknowledgements
5. Timeline
6. References

=====[1....
☐ β˜† βœ‡ Full Disclosure

Multilaser Router - Access Control Bypass through URL Manipulation - CVE-2023-38945

March 3rd 2024 at 00:52

Posted by VinΓ­cius Moraes on Mar 02

=====[Tempest Security Intelligence - Security Advisory -
CVE-2023-38945]=======

Access Control Bypass in Multilaser routers' Web Management Interface

Author: Vinicius Moraes < vinicius.moraes.w () gmail com >

=====[Table of
Contents]========================================================

1. Overview
2. Detailed description
3. Other contexts & solutions
4. Acknowledgements
5. Timeline
6. References

=====[1....
☐ β˜† βœ‡ Full Disclosure

BACKDOOR.WIN32.AUTOSPY.10 / Unauthenticated Remote Command Execution

March 3rd 2024 at 00:52

Posted by malvuln on Mar 02

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/b012704cad2bae6edbd23135394b9127.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.AutoSpy.10
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 1008. Third party adversaries
who can reach an infected host can issue various commands made available by...
☐ β˜† βœ‡ Full Disclosure

Backdoor.Win32.Jeemp.c / Cleartext Hardcoded Credentials

March 3rd 2024 at 00:52

Posted by malvuln on Mar 02

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/d6b192a4027c7d635499133ca6ce067f.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Jeemp.c
Vulnerability: Cleartext Hardcoded Credentials
Description: The malware listens on three TCP ports which are randomized
e.g. 9719,7562,8687,8948,7376,8396 so forth. There is an ESMTP server
component...
☐ β˜† βœ‡ Full Disclosure

Multilaser Router - Access Control Bypass through Header Manipulation - CVE-2023-38944

March 3rd 2024 at 00:52

Posted by VinΓ­cius Moraes on Mar 02

=====[Tempest Security Intelligence - Security Advisory -
CVE-2023-38944]=======

Access Control Bypass in Multilaser routers' Web Management Interface

Author: Vinicius Moraes < vinicius.moraes.w () gmail com >

=====[Table of
Contents]========================================================

1. Overview
2. Detailed description
3. Other contexts & solutions
4. Acknowledgements
5. Timeline
6. References

=====[1....
☐ β˜† βœ‡ Full Disclosure

BACKDOOR.WIN32.AGENT.AMT / Authentication Bypass

March 3rd 2024 at 00:52

Posted by malvuln on Mar 02

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/2a442d3da88f721a786ff33179c664b7.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.amt
Vulnerability: Authentication Bypass
Description: The malware can run an FTP server which listens on TCP port
2121. Third-party attackers who can reach infected systems can logon using
any username/password...
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6671-1

March 1st 2024 at 16:26
Ubuntu Security Notice 6671-1 - It was discovered that php-nyholm-psr7 incorrectly parsed HTTP headers. A remote attacker could possibly use this issue to perform an HTTP header injection attack.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6670-1

March 1st 2024 at 16:24
Ubuntu Security Notice 6670-1 - It was discovered that php-guzzlehttp-psr7 incorrectly parsed HTTP headers. A remote attacker could possibly use these issues to perform an HTTP header injection attack.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6653-3

March 1st 2024 at 16:22
Ubuntu Security Notice 6653-3 - It was discovered that a race condition existed in the ATM subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6647-2

March 1st 2024 at 16:21
Ubuntu Security Notice 6647-2 - It was discovered that a race condition existed in the ATM subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the Rose X.25 protocol implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6651-3

March 1st 2024 at 16:21
Ubuntu Security Notice 6651-3 - It was discovered that a race condition existed in the ATM subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1062-03

March 1st 2024 at 16:09
Red Hat Security Advisory 2024-1062-03 - An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a denial of service vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1061-03

March 1st 2024 at 16:09
Red Hat Security Advisory 2024-1061-03 - An update is now available for Red Hat Satellite 6.13 for RHEL 8. Issues addressed include memory leak and server-side request forgery vulnerabilities.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1057-03

March 1st 2024 at 16:08
Red Hat Security Advisory 2024-1057-03 - An update is now available for Red Hat Ansible Automation Platform 2.4. Issues addressed include crlf injection and denial of service vulnerabilities.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1041-03

March 1st 2024 at 16:08
Red Hat Security Advisory 2024-1041-03 - An update for go-toolset-1.19-golang is now available for Red Hat Developer Tools. Issues addressed include a denial of service vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1055-03

March 1st 2024 at 16:08
Red Hat Security Advisory 2024-1055-03 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include a privilege escalation vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1059-03

March 1st 2024 at 16:08
Red Hat Security Advisory 2024-1059-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Issues addressed include a code execution vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1060-03

March 1st 2024 at 16:08
Red Hat Security Advisory 2024-1060-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include a code execution vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1058-03

March 1st 2024 at 16:08
Red Hat Security Advisory 2024-1058-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include a code execution vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Debian Security Advisory 5634-1

February 29th 2024 at 15:02
Debian Linux Security Advisory 5634-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6653-2

February 29th 2024 at 14:59
Ubuntu Security Notice 6653-2 - It was discovered that a race condition existed in the ATM subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6651-2

February 29th 2024 at 14:56
Ubuntu Security Notice 6651-2 - It was discovered that a race condition existed in the ATM subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1027-03

February 29th 2024 at 14:52
Red Hat Security Advisory 2024-1027-03 - An update is now available for MTA-6.2-RHEL-8 and MTA-6.2-RHEL-9. Issues addressed include XML injection and denial of service vulnerabilities.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6648-2

February 29th 2024 at 14:52
Ubuntu Security Notice 6648-2 - It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Zhenghan Wang discovered that the generic ID allocator implementation in the Linux kernel did not properly check for null bitmap when releasing IDs. A local attacker could use this to cause a denial of service.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6668-1

February 28th 2024 at 16:02
Ubuntu Security Notice 6668-1 - It was discovered that when python-openstackclient attempted to delete a non-existing access rule, it would delete another existing access rule instead, contrary to expectations.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6666-1

February 28th 2024 at 16:01
Ubuntu Security Notice 6666-1 - It was discovered that libuv incorrectly truncated certain hostnames. A remote attacker could possibly use this issue with specially crafted hostnames to bypass certain checks.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6667-1

February 28th 2024 at 16:01
Ubuntu Security Notice 6667-1 - It was discovered that Cpanel-JSON-XS incorrectly decoded certain data. A remote attacker could use this issue to cause Cpanel-JSON-XS to crash, resulting in a denial of service, or possibly obtain sensitive information.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6665-1

February 28th 2024 at 15:57
Ubuntu Security Notice 6665-1 - Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered that Unbound incorrectly handled validating DNSSEC messages. A remote attacker could possibly use this issue to cause Unbound to consume resources, leading to a denial of service. It was discovered that Unbound incorrectly handled preparing an NSEC3 closest encloser proof. A remote attacker could possibly use this issue to cause Unbound to consume resources, leading to a denial of service.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6664-1

February 28th 2024 at 15:57
Ubuntu Security Notice 6664-1 - It was discovered that less incorrectly handled certain file names. An attacker could possibly use this issue to cause a crash or execute arbitrary commands.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6644-2

February 28th 2024 at 15:57
Ubuntu Security Notice 6644-2 - USN-6644-1 fixed vulnerabilities in LibTIFF. This update provides the corresponding updates for Ubuntu 22.04 LTS. It was discovered that LibTIFF incorrectly handled certain files. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause the application to crash, resulting in a denial of service. It was discovered that LibTIFF incorrectly handled certain image files with the tiffcp utility. If a user were tricked into opening a specially crafted image file, an attacker could possibly use this issue to cause tiffcp to crash, resulting in a denial of service. It was discovered that LibTIFF incorrectly handled certain files. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause the application to consume resources, resulting in a denial of service.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Debian Security Advisory 5633-1

February 28th 2024 at 15:57
Debian Linux Security Advisory 5633-1 - It was discovered that malformed DNSSEC records within a DNS zone could result in denial of service against Knot Resolver, a caching, DNSSEC- validating DNS resolver.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1017-03

February 28th 2024 at 15:54
Red Hat Security Advisory 2024-1017-03 - An update for the postgresql:15 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1018-03

February 28th 2024 at 15:54
Red Hat Security Advisory 2024-1018-03 - An update for kernel is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include null pointer, privilege escalation, and use-after-free vulnerabilities.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-1007-03

February 28th 2024 at 15:54
Red Hat Security Advisory 2024-1007-03 - An update for the gimp:2.8 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include a buffer overflow vulnerability.
❌