[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194770 Download | Alert*

A vulnerability was discovered in mosquitto, a MQTT version 3.1/3.1.1 compatible message broker, allowing a malicious MQTT client to cause a denial of service , by sending a specially crafted SUBSCRIBE packet containing a topic with a extremely deep hierarchy.

A vulnerability was discovered in mosquitto, a MQTT version 3.1/3.1.1 compatible message broker, allowing a malicious MQTT client to cause a denial of service , by sending a specially crafted SUBSCRIBE packet containing a topic with a extremely deep hierarchy.

mosquitto: MQTT version 3.1/3.1.1 compatible message broker Mosquitto could be made to crash or run programs if it received specially crafted network traffic.

This update for hunspell fixes the following issues: - CVE-2019-16707: Fixed an invalid read in SuggestMgr:leftcommonsubstring .

Hunspell is a spell checker and morphological analyzer library and program designed for languages with rich morphology and complex word compounding or character encoding. Security Fix: * hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, ref ...

[1.3.2-16] - Resolves: rhbz#1775556 CVE-2019-16707

Hunspell is a spell checker and morphological analyzer library and program designed for languages with rich morphology and complex word compounding or character encoding. Security Fix: * hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, ref ...

Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx

The host is installed with Apache HTTP Server 2.4.18 through 2.4.39 and is prone to a read-after-free vulnerability. A flaw is present in the application, which fails to properly handle an issue in mod_http2. Successful exploitation could allow attackers to read memory after being freed during connection shutdown using fuzzed network input.

It was discovered that the Special:Redirect functionality of MediaWiki, a website engine for collaborative work, could expose suppressed user names, resulting in an information leak.


Pages:      Start    9295    9296    9297    9298    9299    9300    9301    9302    9303    9304    9305    9306    9307    9308    ..   19476

© SecPod Technologies