[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 80802 Download | Alert*

evolution [3.28.5-12] - Add patch for RH bug #1778799 [3.28.5-11] - Update patch for RH bug #1764563 [3.28.5-10] - Add patch for RH bug #1764563 - Add patch for RH bug #1753220 evolution-data-server [3.28.5-13] - Resolves: #1791547 [3.28.5-12] - Add patch for RH bug #1788478 evolution-ews [3.28.5-9] - Remove patch for RH bug #1765005 [3.28.5-8] - Remove patch for RH bug #1765005 [3.28.5-7] ...

accountsservice [0.6.50-8] - Dont set HasNoUsers=true if realmd has providers Related: #1750516 appstream-data [8-20191129] - Regenerate the RHEL metadata to include the latest evince changes - Resolves: #1768461 clutter [1.26.2-8] - rebuild to get the new in 8.2.0 - plus address #1785233 evince [3.28.4-4] - Remove metainfo for plugins since they are not real addons - Resolves: #1760363 gdm [3.28. ...

glib2 [2.56.1-7] - Backport patch to limit access to files when copying Resolves: #1722099 [2.56.1-6] - Backport patches for GDBus auth Resolves: #1777221 ibus [1.5.17-11] - Resolves: #1750835 - Fix CVE-2019-14822 missing authorization allows

[7:3.5.20-17.6] - Resolves: #1944256 - CVE-2020-25097 squid: improper input validation may allow a trusted client to perform HTTP Request Smuggling

squid [7:4.11-4.2] - Resolves: #1944260 - CVE-2020-25097 squid:4/squid: improper input validation may allow a trusted client to perform HTTP Request Smuggling

Integer overflow in exec/totemcrypto.c:authenticate_nss_2_3 functionAn integer overflow leading to an out-of-bound read was found in authenticate_nss_2_3 in Corosync. An attacker could craft a malicious packet that would lead to a denial of service.

Heap-based buffer overflow vulnerability in extract_status_code function in lib/html.c that parses HTTP status code returned from web server allows malicious web server or man-in-the-middle attacker pretending to be a web server to cause either a denial of service or potentially execute arbitrary code on keepalived load balancer.

A flaw was found in the way bind implemented tunable which limited simultaneous TCP client connections. A remote attacker could use this flaw to exhaust the pool of file descriptors available to named, potentially affecting network connections and the management of files such as log files or zone journal files. In cases where the named process is not limited by OS-enforced per-process limits, this ...

An integer overflow in curl#039;s URL API results in a buffer overflow in libcurl. A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl

libical: Heap buffer over read in icalparser.c parser_get_next_char libical: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c Mozilla: Sandbox escape using Prompt:Open libical: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c libical: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c Mozilla: Type confusion in Array.pop


Pages:      Start    3224    3225    3226    3227    3228    3229    3230    3231    3232    3233    3234    3235    3236    3237    ..   8080

© SecPod Technologies