MediaWiki is a collaborative editing software, used by big projects like Wikipedia.
+Multiple vulnerabilities have been discovered in MediaWiki. Please review the CVE identifiers referenced below for details.
+Please review the referenced CVE identifiers for details.
+There is no known workaround at this time.
+All MediaWiki users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.38.5"
+
+ Modsecurity Core Rule Set is the OWASP ModSecurity Core Rule Set.
+Multiple vulnerabilities have been discovered in OWASP ModSecurity Core Rule Set. Please review the CVE identifiers referenced below for details.
+Please review the referenced CVE identifiers for details.
+There is no known workaround at this time.
+All OWASP ModSecurity Core Rule Set users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-apache/modsecurity-crs-3.3.4"
+
+ LibreCAD is a generic 2D CAD program.
+Multiple vulnerabilities have been discovered in LibreCAD. Please review the CVE identifiers referenced below for details.
+Please review the referenced CVE identifiers for details.
+There is no known workaround at this time.
+All LibreCAD users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=media-gfx/librecad-2.1.3-r7"
+
+ Tinyproxy is a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems.
+Tinyproxy's request processing does not sufficiently null-initialize variables used in error pages.
+Contents of the Tinyproxy server's memory could be disclosed via generated error pages.
+There is no known workaround at this time.
+All Tinyproxy users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-proxy/tinyproxy-1.11.1_p20220908"
+
+ snakeyaml is a YAML 1.1 parser and emitter for Java.
+Multiple vulnerabilities have been discovered in snakeyaml. Please review the CVE identifiers referenced below for details.
+Please review the referenced CVE identifiers for details.
+There is no known workaround at this time.
+All snakeyaml users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-java/snakeyaml-1.33"
+
+