[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193677 Download | Alert*

gnutls28: GNU TLS library Several security issues were fixed in GnuTLS.

GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

gnutls28: GNU TLS library Several security issues were fixed in GnuTLS.

The gnutls package provide the GNU Transport Layer Security library,

The gnutls package provide the GNU Transport Layer Security library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. This package update fixes a timing side-channel in deterministic ECDSA. Security Fix: gnutls: vulnerable to Minerva side-channel information leak For more details about the security issue, including the impact, a CVSS score, acknowledgments, and ...

It was discovered that Cockpit, a web console for Linux servers, was susceptible to arbitrary command execution if an administrative user was tricked into opening an sosreport file with a malformed filename.

The Cockpit Web Console enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.

The host is installed with PuTTY 0.68 before 0.81, WinSCP before 6.3.3, FileZilla before 3.67.0 and is prone to a key recovery attack vulnerability. A flaw is present in the application, which fails to properly handle issues in the ECDSA nonce generation. Successful exploitation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures and furth ...

In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git se ...


Pages:      Start    13    14    15    16    17    18    19    20    21    22    23    24    25    26    ..   19367

© SecPod Technologies