There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

sirico ,
@sirico@feddit.uk avatar

I could be wrong but this is a quick summary as I would look at it. As the Sysop for a small company running linux


<span style="color:#323232;">Fortinet FortiOS, FortiProxy, and FortiSwitchManager:
</span><span style="color:#323232;">    Type: Authentication bypass vulnerability
</span><span style="color:#323232;">    Impact: If you're using any of these Fortinet products, an attacker could bypass authentication mechanisms and potentially access or control the system.
</span><span style="color:#323232;">    Affect on Linux users: Only those Linux users who have these Fortinet products in their environments would be affected.
</span><span style="color:#323232;">
</span><span style="color:#323232;">CVE-2022-39952:
</span><span style="color:#323232;">    Product: Fortinet FortiNAC
</span><span style="color:#323232;">    Type: Unauthenticated remote code execution (RCE)
</span><span style="color:#323232;">    Impact: Attackers can remotely execute code without authentication.
</span><span style="color:#323232;">    Affect on Linux users: Relevant for Linux users/administrators who use Fortinet FortiNAC in their network.
</span><span style="color:#323232;">
</span><span style="color:#323232;">CVE-2021-22205:
</span><span style="color:#323232;">    Product: GitLab CE/EE
</span><span style="color:#323232;">    Type: Unauthenticated RCE
</span><span style="color:#323232;">    Impact: An attacker could remotely execute code without authentication on GitLab instances.
</span><span style="color:#323232;">    Affect on Linux users: This would affect Linux users who host or interact with GitLab CE/EE instances.
</span><span style="color:#323232;">
</span><span style="color:#323232;">CVE-2019-18935:
</span><span style="color:#323232;">    Product: Progress Telerik UI for ASP.NET AJAX
</span><span style="color:#323232;">    Type: Unauthenticated RCE
</span><span style="color:#323232;">    Impact: Allows remote code execution on affected servers using this UI component.
</span><span style="color:#323232;">    Affect on Linux users: Most Linux users would not be impacted unless they host ASP.NET applications using this specific UI component.
</span><span style="color:#323232;">
</span><span style="color:#323232;">CVE-2019-9670 / CVE-2019-9621:
</span><span style="color:#323232;">    Product: Zimbra Collaboration Suite
</span><span style="color:#323232;">    Type: Bundle of two vulnerabilities for unauthenticated RCE
</span><span style="color:#323232;">    Impact: Attackers can remotely execute code without authentication on systems using Zimbra.
</span><span style="color:#323232;">    Affect on Linux users: Linux users who use or host the Zimbra Collaboration Suite would be affected.
</span><span style="color:#323232;">
</span><span style="color:#323232;">ProxyShell (CVE-2021-34473, CVE-2021-34523v, CVE-2021-31207):
</span><span style="color:#323232;">    Product: Microsoft Exchange
</span><span style="color:#323232;">    Type: Set of three chained vulnerabilities for unauthenticated RCE
</span><span style="color:#323232;">    Impact: Attackers can exploit these vulnerabilities in sequence to remotely execute code on Exchange servers.
</span><span style="color:#323232;">    Affect on Linux users: This primarily impacts organizations that run Microsoft Exchange servers. Directly, Linux users wouldn't be affected unless they interact with or administer these servers.
</span>
  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines