![]() ![]() ![]() pidgin-otr - use after free pidgin-otr 4.0.2 Without Tor after the request is accepted, which would reveal the user's Request, an attacker could cause Ricochet to make network requests CVE-2016-2342 ricochet - information disclosure ricochet 1.1.2īy sending a nickname with some HTML tags in a contact Particularly configured remote bgpd hosts. CVE-2016-3115 quagga - stack based buffer overflow vulnerability quagga 0309Ī malicious BGP peer may execute arbitrary code in This is the default.įor authorized_keys that specify a "command" restriction,Īlso set the "restrict" (available in OpenSSH >=7.2) or Which was not written with a hostile user in mind, as an Other xauth commands allow limited information leakage,įile overwrite, port probing and generally expose xauth(1), Injection of xauth commands grants the ability to readĪrbitrary files under the authenticated user's privilege, Missing sanitisation of untrusted input allows anĪuthenticated user who is able to request X11 forwarding openssh - command injection when X11Forwarding is enabled openssh-portable 7.2.p2,1 Fixed bug #71587 (Use-After-Free / Double-Free in WDDX.Fixed bug #71498 (Out-of-Bound Read in phar_parse_zipfile()). ![]() php5 - multiple vulnerabilities php55-phar php55-wddx 5.5.33 php56-phar php56-wddx 5.6.19 Fixed bug #71610 (Type Confusion Vulnerability - SOAP /.Overflows in xml/filter_url/addcslashes). Fixed bug #71637 (Multiple Heap Overflow due to integer.php7 - multiple vulnerabilities php70 php70-soap 7.0.4 Properly sanitize the names of get and post variables, leading to aĬross site scripting vulnerability. The GetURLArguments function for the JpGraph's Graph class does not Various types of graphs which also contains support for client side JpGraph is an object oriented library for PHP that can be used to create Could allow bypass ofĪuthorized_keys command= restrictions CVE-2016-3116 jpgraph2 - XSS vulnerability jpgraph2 3.0.7_1 That may potentially be used for DoS or memory corruption attacks.įix a defect that can cause memory corruption inįix a defect that makes the CacheBleed Attack possible CVE-2016-2315 node - multiple vulnerabilities node 5.7.1įix a double-free defect in parsing malformed DSA keys CVE-2016-2324 git - potential code execution git 2.7.0 Integer overflow due to a loop which adds more to "len". RPC traffic from clients, potentially including authenticationĬredentials, may be intercepted by a malicious user with access to CVE-2016-2385 hadoop2 - unauthorized disclosure of data vulnerability hadoop2 2.6 2.7 + kamailio - SEAS Module Heap overflow kamailio 4.3.5Ī (remotely exploitable) heap overflow vulnerability was found in Will occur within the bounds of the cworkspace stack buffer, leading toĪ stack buffer overflow. PCRE does not validate that handling the (*ACCEPT) verb ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |