[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 43737 Download | Alert*

Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix: * snakeyaml: Denial of Service due to missing nested depth limitation for collections For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the ...

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks . If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks . If the parser is running on user supplied input, an attacker may supply c ...

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks . If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow

[1.6.1-20.1] - Resolves: #2196575 - CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64

[1.5.2-6.0.1.1] - Rebuild bumping release [1.5.2-6.1] - Resolves: #2196120 - CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64

[1.6.1-6.1] - Resolves: #2196572 - CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64

Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility 1.6.1 and prior versions

Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility 1.6.1 and prior versions

Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility 1.6.1 and prior versions

Ronald Crane discovered that missing input saniting in the apr_base64 functions of apr-util, the Apache Portable Runtime utility library, may result in denial of service or potentially the execution of arbitrary code.


Pages:      Start    1223    1224    1225    1226    1227    1228    1229    1230    1231    1232    1233    1234    1235    1236    ..   4373

© SecPod Technologies