[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 82236 Download | Alert*

linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty The system could be made to crash or run programs as an administrator.

linux: Linux kernel The system could be made to crash or run programs as an administrator.

linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty The system could be made to crash or run programs as an administrator.

linux: Linux kernel The system could be made to crash or run programs as an administrator.

linux: Linux kernel The system could be made to crash under certain conditions.

Nikolay Ermishkin from the Mail.Ru Security Team and Stewie discovered several vulnerabilities in ImageMagick, a program suite for image manipulation. These vulnerabilities, collectively known as ImageTragick, are the consequence of lack of sanitization of untrusted input. An attacker with control on the image input could, with the privileges of the user running the application, execute code , mak ...

Bob Friesenhahn from the GraphicsMagick project discovered a command injection vulnerability in ImageMagick, a program suite for image manipulation. An attacker with control on input image or the input filename can execute arbitrary commands with the privileges of the user running the application. This update removes the possibility of using pipe in filenames to interact with imagemagick. It is i ...

It was discovered that a NULL pointer dereference in the Nginx code responsible for saving client request bodies to a temporary file might result in denial of service: Malformed requests could crash worker processes.

Several vulnerabilities have been discovered in the chromium web browser. CVE-2016-1696 A cross-origin bypass was found in the bindings to extensions. CVE-2016-1697 Mariusz Mlynski discovered a cross-origin bypass in Blink/Webkit. CVE-2016-1698 Rob Wu discovered an information leak. CVE-2016-1699 Gregory Panakkal discovered an issue in the Developer Tools feature. CVE-2016-1700 Rob Wu discovered a ...

Several vulnerabilities were discovered in spice, a SPICE protocol client and server library. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-0749 Jing Zhao of Red Hat discovered a memory allocation flaw, leading to a heap-based buffer overflow in spice"s smartcard interaction. A user connecting to a guest VM via spice can take advantage of this flaw to ...


Pages:      Start    3742    3743    3744    3745    3746    3747    3748    3749    3750    3751    3752    3753    3754    3755    ..   8223

© SecPod Technologies