[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195386 Download | Alert*

strongswan: IPsec VPN solution strongSwan could be made do denial of service if it received a specially crafted certificate.

This update for strongswan fixes the following issues: - CVE-2022-40617: Fixed that using untrusted URIs for revocation checking could lead to denial of service

This update for strongswan fixes the following issues: - CVE-2022-40617: Fixed that using untrusted URIs for revocation checking could lead to denial of service

This update for strongswan fixes the following issues: Security issues fixed: - CVE-2022-40617: Fixed that using untrusted URIs for revocation checking could lead to denial of service Feature changes: - Enable Marvell plugin

SUSE Security Update: Security update for strongswan

The host is installed with Axiosys Bento4 1.6.0-639 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle an issue in function AP4_DataBuffer::SetDataSize of the component Avcinfo. Successful exploitation allows remote attackers to cause unspecified impact.

The host is installed with Axiosys Bento4 1.6.0-639 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle an issue in function AP4_Mp4AudioDsiParser::ReadBits of the file Ap4Mp4AudioInfo.cpp of the component mp4hls. Successful exploitation allows remote attackers to cause unspecified impact.

This package is a PEAR library for using a Central Authentication Service. Autoloader: %{pear_phpdir}/CAS/Autoload.php

This package is a PEAR library for using a Central Authentication Service. Autoloader: %{pear_phpdir}/CAS/Autoload.php

The host is installed with Axiosys Bento4 1.5.1.0 and is prone to a uncontrolled resource consumption vulnerability. A flaw is present in the applications which fails to properly handle an issue in unspecified vectors. Successful exploitation allows remote attackers to cause unspecified impact.


Pages:      Start    9606    9607    9608    9609    9610    9611    9612    9613    9614    9615    9616    9617    9618    9619    ..   19538

© SecPod Technologies