[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:88488
libxslt: XSLT processing library Several security issues were fixed in Libxslt.

oval:org.secpod.oval:def:73969
The host is installed with Google Chrome before 91.0.4472.164 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:73958
The host is installed with Google Chrome before 91.0.4472.164 or Edge-Chromium before 91.0.864.71 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:88394
Nick Wellnhofer discovered that the xsltApplyTemplates function in libxslt, an XSLT processing runtime library, is prone to a use-after-free flaw, resulting in a denial of service, or potentially the execution of arbitrary code if a specially crafted file is processed.

oval:org.secpod.oval:def:73945
The host is installed with Google Chrome before 91.0.4472.164 or Edge-Chromium before 91.0.864.71 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:707680
libxslt: XSLT processing library Several security issues were fixed in Libxslt.

oval:org.secpod.oval:def:73970
The host is installed with Google Chrome before 91.0.4472.164 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:89048614
This update for libxslt fixes the following issues: * CVE-2021-30560: Fixing a use after free vulnerability in Blink XSLT .

oval:org.secpod.oval:def:609348
Nick Wellnhofer discovered that the xsltApplyTemplates function in libxslt, an XSLT processing runtime library, is prone to a use-after-free flaw, resulting in a denial of service, or potentially the execution of arbitrary code if a specially crafted file is processed.

oval:org.secpod.oval:def:89048600
This update for libxslt fixes the following issues: * CVE-2021-30560: Fixing a use after free vulnerability in Blink XSLT .

oval:org.secpod.oval:def:83403
libxslt: XSLT processing library Several security issues were fixed in Libxslt.

oval:org.secpod.oval:def:89048540
This update for libxslt fixes the following issues: * CVE-2021-30560: Fixing a use after free vulnerability in Blink XSLT .

oval:org.secpod.oval:def:88468
libxslt: XSLT processing library Several security issues were fixed in Libxslt.

oval:org.secpod.oval:def:73955
The host is missing a high severity security update according to the Google advisory and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

oval:org.secpod.oval:def:73942
The host is missing a high severity security update according to the Google advisory and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

oval:org.secpod.oval:def:73964
The host is missing a high severity security update according to the Google advisory and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

oval:org.secpod.oval:def:73963
The host is missing a high severity security update according to the Google advisory and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

oval:org.secpod.oval:def:120458
Chromium is an open-source web browser, powered by WebKit .

oval:org.secpod.oval:def:120492
Chromium is an open-source web browser, powered by WebKit .

oval:org.secpod.oval:def:3301349
SUSE Security Update: Security update for opera

oval:org.secpod.oval:def:121575
Qt5 - QtWebEngine components.

CWE    1
CWE-416
*CVE
CVE-2021-30560

© SecPod Technologies