[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193578 Download | Alert*

libxml-security-java: Apache XML Security for Java Apache XML Security for Java could be made to expose sensitive information.

libxml-security-java: Apache XML Security for Java Apache XML Security for Java could be made to expose sensitive information.

Apache Santuario - XML Security for Java is vulnerable to an issue where the secureValidation property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.

The host is installed with Adobe Creative Cloud before 5.4.0 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to escalate privileges.

The host is missing a critical severity security update according to Adobe creative cloud advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to escalate privileges.

The host is installed with Adobe InDesign before 16.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix: * redis: Lua scripts can overflow the heap-based L ...

Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix: * redis: Lua scripts can overflow the heap-based L ...

Multiple vulnerabilities were discovered in Redis, a persistent key-value database, which could result in denial of service or the execution of arbitrary code.

This update for redis fixes the following issues: - CVE-2021-32627: Fixed integer to heap buffer overflows with streams . - CVE-2021-32628: Fixed integer to heap buffer overflows handling ziplist-encoded data types . - CVE-2021-32687: Fixed integer to heap buffer overflow with intsets . - CVE-2021-32762: Fixed integer to heap buffer overflow issue in redis-cli and redis-sentinel . - CVE-2021-32626 ...


Pages:      Start    9202    9203    9204    9205    9206    9207    9208    9209    9210    9211    9212    9213    9214    9215    ..   19357

© SecPod Technologies