[Forgot Password]
Login  Register Subscribe

30192

 
 

423868

 
 

233697

 
 

909

 
 

186637

 
 

207

 
 
Paid content will be excluded from the download.

Filter
Matches : 1318 Download | Alert*

[7.0.114-1.0.1] - Update to .NET SDK 7.0.114 and Runtime 7.0.14

[8.0.100-2.0.1] - Update to .NET 8.0 [8.0.100~rc.2-0.1.0.1] - Add support for Oracle Linux [8.0.100~rc.2-0.1] - Update to .NET 8 RC 2 - Resolves: RHEL-13790 [8.0.100~rc.1-0.4] - Disable bootstrap - Related: RHEL-4074 [8.0.100~rc.1-0.3] - Add backported patches for additional s390x issues - Related: RHEL-4074 [8.0.100~rc.1-0.2] - Add patches to fix mono and arm64 issues - Include libmono-*.a files ...

dotnet-hostfxr-8.0 is installed

[4.18.6-2.0.1] - resolves: RHEL-11937 Fix CVE-2023-3961 - smbd must check the pipename - resolves: RHEL-11937 Fix CVE-2023-4091 - SMB clients can truncate files - resolves: RHEL-11937 Fix CVE-2023-42669 - Remove rpcecho server

[6.0.125-1.0.2] - Add strict BuildRequires on 6.0.125-1.0.1 [6.0.125-1.0.1] - Update to .NET SDK 6.0.125 and Runtime 6.0.25

[7.0.114-1.0.1] - Update to .NET SDK 7.0.114 and Runtime 7.0.14

[5.4.17-2136.325.5.el8] - perf symbols: Symbol lookup with kcore can fail if multiple segments match stext [Orabug: 35905508] - char: misc: Increase the maximum number of dynamic misc devices to 1048448 [Orabug: 35905508] - perf/arm-cmn: Fix invalid pointer when access dtc object sharing the same IRQ number [Orabug: 35905508] - char: misc: increase DYNAMIC_MINORS value

The host is installed with Atlassian Bamboo CI server 8.1.0 before 9.2.5, or 9.3.0 before 9.3.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in the unspecified vectors. Successful exploitation could allow an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has no impac ...

Damien Diederen discovered that SASL quorum peer authentication within Zookeeper, a service for maintaining configuration information, was insufficiently enforced in some configurations.

It was reported that incorrect bound checks in the dsaVerify function in node-browserify-sign, a Node.js library which adds crypto signing for browsers, allows an attacker to perform signature forgery attacks by constructing signatures that can be successfully verified by any public key.


Pages:      Start    113    114    115    116    117    118    119    120    121    122    123    124    125    126    ..   131

© SecPod Technologies