[Forgot Password]
Login  Register Subscribe

26309

 
 

132812

 
 

150505

 
 

909

 
 

119751

 
 

158

 
 
Paid content will be excluded from the download.

Filter
Matches : 2969 Download | Alert*

Singularity provides functionality to make portable containers that can be used across host environments.

Singularity provides functionality to make portable containers that can be used across host environments.

GNOME project libxml2 v2.9.10 and earlier have a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 8e7c20a1 (20910-GITv2.9.10-103-g8e7c20a1).

This library allows to manipulate XML files. It includes support to read, modify and write XML and HTML files. There is DTDs support this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM like representations. In this case one can use the built-in XPath and XPointer i ...

This library allows to manipulate XML files. It includes support to read, modify and write XML and HTML files. There is DTDs support this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM like representations. In this case one can use the built-in XPath and XPointer i ...

IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information. IBM X-Force ID: 185590.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.5, 8.5.x through 8.5.5.17, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to an XML external entity injection vulnerability. A flaw is present in the application, which fails to handle XML data. Successful exploitation allows remote attacker to disclose sensitive information.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to access restricted files through a maliciously application.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.6 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to cause an unexpected application termination or arbitrary code execution while processing a maliciously crafted USD file.

The host is installed with Apple Mac OS X 10.13.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. Successful exploitation allows a remote attacker to unexpectedly alter application state.


Pages:      Start    211    212    213    214    215    216    217    218    219    220    221    222    223    224    ..   296

© SecPod Technologies