[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 82199 Download | Alert*

CVE-2017-3313: mariaDB 10.1.22 CVE-2017-3302: mariaDB 10.1.22

The issue can be exploited to trigger an out of bounds write on 64-bit systems.

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affected versions: 9.9.3-S1 -

The SCardReleaseContext function normally releases resources associated with the given handle and clients should cease using this handle. A malicious client can however make the daemon invoke SCardReleaseContext and continue issuing other commands that use "cardsList", resulting in a use-after-free. When SCardReleaseContext is invoked multiple times, it additionally results in a double-free of "c ...

Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library through 2.2.3, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.

CVE-2016-5419: TLS session resumption client cert bypass Fixed In Version curl 7.50.1 Reference Patch CVE-2016-5420: Re-using connection with wrong client cert Fixed In Version curl 7.50.1 Reference Patch CVE-2016-5421: Use of connection struct after free Fixed In Version curl 7.50.1

CVE-2017-3313: mariaDB 10.1.22 CVE-2017-3302: mariaDB 10.1.22 Reference

CVE: none assigned, XSA-207: memory leak when destroying guest without PT devices Reference CVE-2017-2615, XSA-208: oob access in cirrus bitblt copy Reference CVE-2017-2620, XSA-209: cirrus_bitblt_cputovideo does not check if memory region is safe Reference

All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition. Samba uses the real path system call to ensure when a client requests access to a pathname that it is under the exported share path on the server file system.

GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.


Pages:      Start    3789    3790    3791    3792    3793    3794    3795    3796    3797    3798    3799    3800    3801    3802    ..   8219

© SecPod Technologies