[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146396

 
 

909

 
 

117043

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 117045 Download | Alert*

A new domain bypass transient execution attack known as Special Register Buffer Data Sampling has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operatio ...

An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093

json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend

"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor"s keys are replaced with keys which use an unsupporte ...

The host is installed with IBM DB2 9.7 before FP11, 10.1 before FP6, 10.5 before FP11, 11.1 before FP5 and 11.5 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle improper usage of shared memory. Successful exploitation allows an attacker to cause a denial of service due a hang in the execution of a terminate command.

The host is installed with IBM DB2 9.7 before FP11, 10.1 before FP6, 10.5 before FP11, 11.1 before FP5 and 11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle improper usage of shared memory. Successful exploitation allows an attacker to obtain sensitive information or cause a denial of service.

The host is installed with IBM DB2 9.7 before FP11, 10.1 before FP6, 10.5 before FP11, 11.1 before FP5 and 11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle unspecified vectors. Successful exploitation allows an attacker to obtain sensitive information using a race condition of a symbolic link.

The host is installed with IBM DB2 9.7 before FP11, 10.1 before FP6, 10.5 before FP11, 11.1 before FP5 and 11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle unspecified vectors. Successful exploitation allows an attacker to obtain sensitive information using a race condition of a symbolic link.

The host is installed with IBM DB2 9.7 before FP11, 10.1 before FP6, 10.5 before FP11, 11.1 before FP5 and 11.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to execute arbitrary code on the system with root privileges.

The host is installed with IBM DB2 9.7 before FP11, 10.1 before FP6, 10.5 before FP11, 11.1 before FP5 and 11.5 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle Secure Sockets Layer (SSL) renegotiation requests. Successful exploitation allows an attacker to increase the resource usage on the system.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   11704

© SecPod Technologies