[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 82556 Download | Alert*

avahi: IPv4LL network address configuration daemon Several security issues were fixed in Avahi.

cups: Common UNIX Printing System CUPS could be made to expose sensitive information.

libppd: OpenPrinting libppd libppd could be made to crash or run programs if it opened a specially crafted file.

cups: Common UNIX Printing System CUPS could be made to crash or run programs if it opened a specially crafted file.

This update for cups fixes the following issues: * CVE-2023-4504: Fixed heap overflow in OpenPrinting CUPS Postscript Parsing . * CVE-2023-32360: Fixed Information leak through Cups-Get-Document operation .

The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems.

The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix: * cups: Information leak through Cups-Get-Document operation For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix: * cups: Information leak through Cups-Get-Document operation For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents

A vulnerability was found in OpenPrinting CUPS. The security flaw occurs due to failure in validating the length provided by an attacker-crafted CUPS document, possibly leading to a heap-based buffer overflow and code execution


Pages:      Start    4008    4009    4010    4011    4012    4013    4014    4015    4016    4017    4018    4019    4020    4021    ..   8255

© SecPod Technologies