|Paid content will be excluded from the download.
| Matches : 31568
|MinGW Windows LibRaw library.
The library supports many operations that are useful on * Document images * Natural images Fundamental image processing and image analysis operations * Rasterop * Affine transforms on images of arbitrary pixel depth * Projective and bi-linear transforms * Binary and gray scale morphology, rank order filters, and convolution * Seed-fill and connected components * Image transformations with change ...
Container cluster management
This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor
libgxps is a GObject based library for handling and rendering XPS documents.
Hans Jerry Illikainen discovered a type conversion vulnerability in the MP4 demuxer of the VLC media player, which could result in the execution of arbitrary code if a malformed media file is played. This update upgrades VLC in stretch to the new 3.x release series . In addition two packages needed to be rebuild to ensure compatibility with VLC 3; phonon-backend-vlc and goldencheetah . VLC in jes ...
Vulnerability in the MySQL Server component of Oracle MySQL . Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently ...
Path traversal when writing to a symlinked basedir outside of the rootRubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a ...
Vulnerability in the MySQL Server component of Oracle MySQL . Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data.Vulnerability in the MySQL Server component of Oracle My ...
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   3156
© 2013 SecPod Technologies