[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

123775

 
 

909

 
 

102573

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 35081 Download | Alert*

linux-lts-vivid: Linux hardware enablement kernel from Vivid Several security issues were fixed in the kernel.

linux-lts-utopic: Linux hardware enablement kernel from Utopic Several security issues were fixed in the kernel.

linux: Linux kernel The system could be made to run programs as an administrator.

firebird2.5: A full-featured, open source SQL database derived from Borland InterBase 6.0 Several security issues were fixed in Firebird.

openjdk-7: Open Source Java implementation Java applets or applications could be made to expose sensitive information.

php5: HTML-embedded scripting language interpreter Details: USN-3922-1 fixed vulnerabilities in PHP. This update provides the corresponding update for Linux Mint 17.x LTS. It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information. It was discovered that PHP incorrectly handled certain files. An attacker could possibly u ...

Simple Python tool with command line interface for building Docker images. It contains a lot of helpful functions which you would probably implement if you started hooking Docker into your infrastructure.

Simple Python tool with command line interface for building Docker images. It contains a lot of helpful functions which you would probably implement if you started hooking Docker into your infrastructure.

Lalith Rallabhandi discovered that OmniAuth, a Ruby library for implementing multi-provider authentication in web applications, mishandled and leaked sensitive information. An attacker with access to the callback environment, such as in the case of a crafted web application, can request authentication services from this module and access to the CSRF token.

Enrico Zini discovered a vulnerability in Syntastic, an addon module for the Vim editor that runs a file through external checkers and displays any resulting errors. Config files were looked up in the current working directory which could result in arbitrary shell code execution if a malformed source code file is opened.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   3508

© SecPod Technologies