[Forgot Password]
Login  Register Subscribe

23631

 
 

114973

 
 

93458

 
 

909

 
 

76924

 
 

97

 
 
Paid content will be excluded from the download.

Filter
Matches : 76924 Download | Alert*

linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Several security issues were fixed in the Linux kernel.

linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services systems - linux-gke: Linux kernel for Google Container Engine systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-snapdragon: Linux kernel for Snapdragon processors Several security issues were fixed in the Linux kernel.

linux-hwe: Linux hardware enablement kernel Several security issues were fixed in the Linux kernel.

linux: Linux kernel - linux-raspi2: Linux kernel for Raspberry Pi 2 Several security issues were fixed in the Linux kernel.

The host is installed with Internet Explorer 11 or Microsoft Edge and is prone to a memory corruption vulnerability. A flaw is present in the applications, which improperly handles objects in memory. Successful exploitation could allow attackers to execute arbitrary code in the context of the current user.

An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass.An attacker who successfully exploited this vulnerability could retrieve the base address of the kernel driver from a compromised process. To exploit this vuln ...

The host is installed with Oracle MySQL Server through 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Replication. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to C API. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle MySQL Server through 5.5.56, 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Client mysqldump. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle MySQL Server through 5.5.56, 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DDL. Successful exploitation allows attackers to affect Confidentiality and Integrity.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   7692

© 2016 SecPod Technologies