[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 9525 Download | Alert*

A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.

MinGW Windows Glib2 library.

MinGW Windows Glib2 library.

[2.5-11] - Do not evaluate unichar element - Resolves: RHEL-7011

[3.4.0-8.1] - python-reportlab: code injection in paraparser.py allows code execution

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with 'less thanunichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626

The upstream bug report describes this issue as follows:A vulnerability was found in GLib2.0, where DoS caused by handling a malicious text-form variant which is structured to cause looping superlinear to its text size. Applications are at risk if they parse untrusted text-form variants. The upstream bug report describes this issue as follows:A vulnerability was found in GLib2.0, where DoS caused ...

Security Fix: python-reportlab: code injection in paraparser.py allows code execution For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Oracle Solaris 11 - ( CVE-2023-29499 )

Python-reportlab is a library used for generation of PDF documents.


Pages:      Start    713    714    715    716    717    718    719    720    721    722    723    724    725    726    ..   952

© SecPod Technologies