Уведомления о безопасности GLSA
GLSA 201405-20 (средняя) - JBIG-KIT: Denial of Service
A stack-based buffer overflow in JBIG-KIT might allow remote attackers to cause a Denial of Service.
A stack-based buffer overflow in JBIG-KIT might allow remote attackers to cause a Denial of Service.
GLSA 201405-19 (средняя) - MCrypt: User-assisted execution of arbitrary code
Multiple vulnerabilities have been found in MCrypt, allowing attackers to execute arbitrary code or cause Denial of Service.
Multiple vulnerabilities have been found in MCrypt, allowing attackers to execute arbitrary code or cause Denial of Service.
GLSA 201405-18 (средняя) - OpenConnect: User-assisted execution of arbitrary code
A buffer overflow in OpenConnect could result in execution of arbitrary code or Denial of Service.
A buffer overflow in OpenConnect could result in execution of arbitrary code or Denial of Service.
GLSA 201405-17 (средняя) - Munin: Multiple vulnerabilities
Multiple vulnerabilities have been discovered in Munin which may lead to symlink attacks, file creation, or bypass of security restrictions.
Multiple vulnerabilities have been discovered in Munin which may lead to symlink attacks, file creation, or bypass of security restrictions.
GLSA 201405-16 (средняя) - Mono: Denial of Service
A hash collision vulnerability in Mono allows remote attackers to cause a Denial of Service condition.
A hash collision vulnerability in Mono allows remote attackers to cause a Denial of Service condition.
GLSA 201405-15 (средняя) - util-linux: Multiple vulnerabilities
Multiple vulnerabilities have been found in util-linux, the worst of which may lead to Denial of Service.
Multiple vulnerabilities have been found in util-linux, the worst of which may lead to Denial of Service.
GLSA 201405-14 (средняя) - Ruby OpenID: Denial of Service
A vulnerability in Ruby OpenID may lead to Denial of Service.
A vulnerability in Ruby OpenID may lead to Denial of Service.
GLSA 201405-13 (средняя) - Pango: Multiple vulnerabilities
Multiple vulnerabilities have been found in Pango, the worst of which allow execution of arbitrary code or Denial of Service.
Multiple vulnerabilities have been found in Pango, the worst of which allow execution of arbitrary code or Denial of Service.
GLSA 201405-12 (средняя) - Ettercap: Multiple vulnerabilities
Multiple vulnerabilities have been found in Ettercap, the worst of which may allow execution of arbitrary code.
Multiple vulnerabilities have been found in Ettercap, the worst of which may allow execution of arbitrary code.
GLSA 201405-11 (низкая) - Bacula: Information disclosure
A vulnerability in Bacula may allow remote attackers to obtain sensitive information.
A vulnerability in Bacula may allow remote attackers to obtain sensitive information.
GLSA 201405-10 (высокая) - Rack: Multiple vulnerabilities
Multiple vulnerabilities have been found in Rack, the worst of which allow execution of arbitrary code.
Multiple vulnerabilities have been found in Rack, the worst of which allow execution of arbitrary code.
GLSA 201405-09 (средняя) - ImageMagick: Multiple vulnerabilities
Multiple vulnerabilities have been discovered in ImageMagick, the worst of which could lead to arbitrary code execution.
Multiple vulnerabilities have been discovered in ImageMagick, the worst of which could lead to arbitrary code execution.
GLSA 201405-08 (высокая) - ClamAV: Multiple vulnerabilities
Multiple vulnerabilities have been found in ClamAV, the worst of which could lead to arbitrary code execution.
Multiple vulnerabilities have been found in ClamAV, the worst of which could lead to arbitrary code execution.
GLSA 201405-07 (высокая) - X.Org X Server: Multiple vulnerabilities
Multiple vulnerabilities have been found in X.Org X Server, allowing attackers to execute arbitrary code or cause a Denial of Service condition.
Multiple vulnerabilities have been found in X.Org X Server, allowing attackers to execute arbitrary code or cause a Denial of Service condition.
GLSA 201405-06 (высокая) - OpenSSH: Multiple vulnerabilities
Multiple vulnerabilities have been found in OpenSSH, the worst of which may allow remote attackers to execute arbitrary code.
Multiple vulnerabilities have been found in OpenSSH, the worst of which may allow remote attackers to execute arbitrary code.
GLSA 201405-05 (средняя) - Asterisk: Denial of Service
Multiple buffer overflows in Asterisk might allow remote attackers to cause a Denial of Service condition.
Multiple buffer overflows in Asterisk might allow remote attackers to cause a Denial of Service condition.
GLSA 201405-04 (средняя) - Adobe Flash Player: Multiple vulnerabilities
Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which could result in execution of arbitrary code.
Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which could result in execution of arbitrary code.
GLSA 201405-03 (средняя) - WeeChat: Multiple vulnerabilities
Two vulnerabilities have been found in WeeChat, the worst of which may allow execution of arbitrary code.
Two vulnerabilities have been found in WeeChat, the worst of which may allow execution of arbitrary code.
GLSA 201405-02 (средняя) - libSRTP: Denial of Service
A vulnerability in libSRTP can result in a Denial of Service condition.
A vulnerability in libSRTP can result in a Denial of Service condition.
GLSA 201405-01 (средняя) - udisks: Arbitrary code execution
A stack-based buffer overflow vulnerability has been found in udisks, allowing a local attacker to possibly execute arbitrary code or cause Denial of Service.
A stack-based buffer overflow vulnerability has been found in udisks, allowing a local attacker to possibly execute arbitrary code or cause Denial of Service.
« Предыдущий 1 ... 92 93 94 95 96 ... 190 Следующий »
Экспортировать в Atom
