[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The advisory is missing the security advisory description. For more information please visit the reference link

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: nfs: use-after-free in svc_process_common * kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation * kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence * kernel: use-after-free in drivers/char/ipmi/ip ...

Multiple vulnerabilities were found in the PuTTY SSH client, which could result in denial of service and potentially the execution of arbitrary code. In addition, in some situations random numbers could potentially be re-used.

The host is installed with Putty before 0.71 and is prone to a memory Overwrite vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Putty before 0.71 and is prone to multiple denial of service vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to crash the application.

The host is installed with Putty before 0.71 and is prone to a random number prediction vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to predict random numbers being generated.

The libssh2 packages provide a library that implements the SSH2 protocol. Security Fix: * libssh2: Integer overflow in transport read resulting in out of bounds write * libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write * libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write * libssh2: Integer overflow in user authen ...

The libssh2 packages provide a library that implements the SSH2 protocol. Security Fix: * libssh2: Integer overflow in transport read resulting in out of bounds write * libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write * libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write * libssh2: Integer overflow in user authen ...

The libssh2 packages provide a library that implements the SSH2 protocol. The following packages have been upgraded to a later upstream version: libssh2 . Security Fix: * libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read * libssh2: Out-of-bounds reads with specially crafted SSH packets For more details about the security issue, including the imp ...

The host is installed with Xcode before 11.0 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple issues in libssh2. Successful exploitation allows an attacker to execute arbitrary code.


Pages:      Start    9363    9364    9365    9366    9367    9368    9369    9370    9371    9372    9373    9374    9375    9376    ..   19541

© SecPod Technologies