[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 6321 Download | Alert*

[78.12.0-1.0.1] - Removed Upstream references - Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file [78.12.0-1] - Update to 78.12.0 build1

[78.12.0-1.0.1] - Remove upstream references [Orabug: 30143292] - Update distribution for Oracle Linux [Orabug: 30143292] - Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file [78.12.0-1] - Update to 78.12.0 build1

[78.12.0-2.0.1] - Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js [78.12.0-2] - Update to 78.12.0 build2 [78.12.0-1] - Update to 78.12.0 build1

[78.12.0-3.0.1] - Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js [78.12.0-3] - Rebuild to pickup older nss [78.12.0-2] - Update to 78.12.0 build2 [78.12.0-1] - Update to 78.12.0 build1

Vim is an updated and improved version of the vi editor. Security Fix: * A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim

Vim is an updated and improved version of the vi editor. Security Fix: * A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim

[8.0.1763-16.0.1] - - Remove upstream references [Orabug: 31197557] [2:8.0.1763-16] - 2004974 - CVE-2021-3796 vim: use-after-free in nv_replace in normal.c [rhel-8.5.0] - 2004891 - CVE-2021-3778 vim: heap-based buffer overflow in utf_ptr2char in mbyte.c [rhel-8.5.0]

[8.0.1763-16.0.1.4] - - Remove upstream references [Orabug: 31197557] [2:8.0.1763-16.4] - CVE-2021-4193 vim: vulnerable to Out-of-bounds Read - CVE-2021-4192 vim: vulnerable to Use After Free [2:8.0.1763-16.3] - 2028341 - CVE-2021-3984 vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow [rhel-8.6.0] - 2028430 - CVE-2021-4019 vim: heap-based buffer overflow in find_help_t ...

[8.0.1763-16.0.1] - - Remove upstream references [Orabug: 31197557] [2:8.0.1763-16.12] - CVE-2022-0361 vim: Heap-based Buffer Overflow in GitHub repository [2:8.0.1763-16.11] - CVE-2022-0413 vim: use after free in src/ex_cmds.c - Fix specfile problems - Resolves: rhbz#2048525 [2:8.0.1763-16.10] - CVE-2022-0413 vim: use after free in src/ex_cmds.c - Resolves: rhbz#2048525 [2:8.0.1763-16.9] - CVE-20 ...

[8.0.1763-16.0.1] - - Remove upstream references [Orabug: 31197557] [2:8.0.1763-16.13] - CVE-2022-1154 vim: use after free in utf_ptr2char


Pages:      Start    231    232    233    234    235    236    237    238    239    240    241    242    243    244    ..   632

© SecPod Technologies