[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

This update for perl-DBI fixes the following issues: Security issues fixed: - CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated . - CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name .

This update for perl-DBI fixes the following issues: Security issues fixed: - CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated . - CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name .

This update for perl-DBI fixes the following issues: Security issues fixed: - CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated . - CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name .

cryptsetup - disk encryption support - startup scripts. Cryptsetup could be made to execute arbitrary code if it received a specially crafted input.

[2.3.3-2] - patch: Fix possible memory corruption in LUKS2 validation code in 32bit library. - Resolves: #1872294 [2.3.3-1] - Update to cryptsetup 2.3.3 - Resolves: #1796826 #1743891 #1785748 [2.3.1-1] - Update to cryptsetup 2.3.1 - Resolves: #1796826 #1743891 #1785748

The cryptsetup packages provide a utility for setting up disk encryption using the dm-crypt kernel module.

A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server"s potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.

In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Sample apps (Spring Framework). Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Sample apps (Spring Framework). Successful exploitation can cause unspecified impact.


Pages:      Start    9434    9435    9436    9437    9438    9439    9440    9441    9442    9443    9444    9445    9446    9447    ..   19541

© SecPod Technologies