The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.
The host is installed with RealVNC VNC Server before 6.11.0 or VNC Viewer before 6.22.826 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle MSI installer repair mode. Successful exploitation could allow attackers to gain local privilege.
A library that provides Abstract Syntax Notation One parsing and structures management, and Distinguished Encoding Rules encoding and decoding functions. Security Fix: * libtasn1: Out-of-bound access in ETYPE_OK For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
A library that provides Abstract Syntax Notation One parsing and structures management, and Distinguished Encoding Rules encoding and decoding functions. Security Fix: * libtasn1: Out-of-bound access in ETYPE_OK For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
The host is installed with GitLab CE/EE 9.3 before 15.2.5, 15.3 before 15.3.4 or 15.4 before 15.4.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in webhook logs. Successful exploitation allows a project maintainer to access the DataDog integration API key.
The host is installed with GitLab CE/EE 9.3 before 15.2.5, 15.3 before 15.3.4 or 15.4 before 15.4.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in webhook logs. Successful exploitation allows a project maintainer to access the DataDog integration API key.
The host is installed with Google Chrome before 106.0.5249.61 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 106.0.5249.61 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.