[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8692 Download | Alert*

The advisory is missing the security advisory description. For more information please visit the reference link

[2.2.5-4] - add security fixes for CVE-2018-20843, CVE-2019-15903

[68.2.0-4.0.1] - fix LD_LIBRARY_PATH - Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat one [68.2.0-4] - Added patch for TLS 1.3 support. [68.2.0-3] - Rebuild [68.2.0-2] - Rebuild [68.2.0-1] - Update to 68.2.0 ESR [68.1.0-6] - Enable system nss on RHEL6 [68.1.0-2] - Enable building langpacks [68.1.0-1] - Update to 68.1.0 ESR [68.0.1-4] - Enable system nss [68.0.1-3] - Enabl ...

[2.1.0-12] - add security fixes for CVE-2018-20843, CVE-2019-15903

It was discovered that the "setElementTypePrefix" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service. In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document ...

It was discovered that the "setElementTypePrefix" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service. In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document ...

A NULL pointer dereference was found in Apache httpd mod_h2. The highest threat from this flaw is to system integrity. A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability. An out-of-bounds read in mod_proxy_uwsgi of httpd allows a remote unauthenticate ...

Several memory safety bugs were discovered in Mozilla Firefox and Thunderbird. Memory corruption and arbitrary code execution are possible with these vulnerabilities. These bugs can be exploited over the network.A flaw was discovered in both Firefox and Thunderbird where 4 bytes of a HMAC output could be written past the end of a buffer stored on the memory stack. This could allow an attacker to e ...

It was discovered that the "setElementTypePrefix" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service. In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document ...

A NULL pointer dereference was found in Apache httpd mod_h2. The highest threat from this flaw is to system integrity. A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability. An out-of-bounds read in mod_proxy_uwsgi of httpd allows a remote unauthenticate ...


Pages:      Start    381    382    383    384    385    386    387    388    389    390    391    392    393    394    ..   869

© SecPod Technologies