[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 6597 Download | Alert*

Multiple security issues were discovered in QEMU, a fast processor emulator: CVE-2020-12829 An integer overflow in the sm501 display device may result in denial of service. CVE-2020-14364 An out-of-bands write in the USB emulation code may result in guest-to-host code execution. CVE-2020-15863 A buffer overflow in the XGMAC network device may result in denial of service or the execution of arbitra ...

Two security issues were found in the Qt library, which could result in plugins and libraries being loaded from the current working directory, resulting in potential code execution.

Two security issues were found in the Qt library, which could result in plugins and libraries being loaded from the current working directory, resulting in potential code execution.

Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed.

Multiple vulnerabilities were discovered in libwebp-dev, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed.

Several vulnerabilities were discovered in Squid, a fully featured web proxy cache, which could result in exposure of sensitive information in the cache manager , or denial of service or information disclosure if Squid is configured to negotiate authentication with the SSPI and SMB authentication helpers .

Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service or information leaks.

Multiple vulnerabilities have been discovered in the libxen-dev hypervisor, which could result in denial of service or information leaks.

Two vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in denial of service.

It was discovered that the Key Distribution Center in krb5, the MIT implementation of Kerberos, is prone to a NULL pointer dereference flaw. An unauthenticated attacker can take advantage of this flaw to cause a denial of service by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST.


Pages:      Start    367    368    369    370    371    372    373    374    375    376    377    378    379    380    ..   659

© SecPod Technologies