A vulnerability was found in MIT Kerberos 5 up to 1.18.4/1.19.2 (Network Authentication Software) and classified as problematic. This issue affects an unknown code of the file kdc/do_tgs_req.c of the component Key Distribution Center Handler. Upgrading to version 1.18.5 or 1.19.3 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
MIT Kerberos 5 up to 1.18.4/1.19.2 Key Distribution Center kdc/do_tgs_req.c null pointer dereference
Description Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a remote code execution (RCE)
Description Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe,
CVE-2023-42454 : SQLpage Up To 0.11.0 Database Connection String sqlpage/sqlpage.json Information Disclosure
Description SQLpage is a SQL-only webapp builder. Someone using SQLpage versions prior to 0.11.1, whose SQLpage instance is exposed publicly,