[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254492

 
 

909

 
 

198541

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197656 Download | Alert*

This update for libX11 fixes the following issues: - CVE-2022-3554: Fixed memory leak in XRegisterIMInstantiateCallback . - CVE-2022-3555: Fixed memory leak in _XFreeX11XCBStructure .

tmux: terminal multiplexer tmux could be made to crash if it received a specially crafted input.

tmux: terminal multiplexer tmux could be made to crash if it received a specially crafted input.

The host is installed with Java for Mac OS X before 10.6 Update 3 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle Mach RPC messages. Successful exploitation could allow attacker to execute arbitrary code.

The host is installed with Java for Mac OS X before 10.6 Update 3 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle Mach RPC messages. Successful exploitation could allow attacker to execute arbitrary code.

The noexec mount option specifies that the filesystem cannot contain executable binaries. Rationale: Since the /var/tmp filesystem is only intended for temporary file storage, set this option to ensure that users cannot run executable binaries from /var/tmp.

The kernel module jffs2 should be disabled.

The /etc/shadow file is used to store the information about user accounts that is critical to the security of those accounts, such as the hashed password and other security information. Rationale: If attackers can gain read access to the /etc/shadow file, they can easily run a password cracking program against the hashed password to break it. Other security information that is stor ...

The host is installed with WSO2 API Manager before 4.2.0 and is prone to a reflected cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle /authenticationendpoint/login.do of WSO2 API Manager. Successful exploitation allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tenantDomain parameter.

The host is missing a critical security update according to Adobe advisory, APSB21-92. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code and cause denial-of-service.


Pages:      Start    10816    10817    10818    10819    10820    10821    10822    10823    10824    10825    10826    10827    10828    10829    ..   19765

© SecPod Technologies