![]() High CVE-2024-0223: Heap buffer overflow in ANGLE.Reported by Toan (suto) Pham of Qrious Secure on High CVE-2024-0222: Use after free in ANGLE.CVE-2023-51714 mantis - multiple vulnerabilities mantis-php74 mantis-php80 mantis-php81 mantis-php82 mantis-php83 2.25.8,1 ![]() In total headers, or more than 2GiB for any given header pair, then If the HTTP2 implementation receives more than 4GiB Reported by Malcolm Stagg of SODIUM-24, LLC on ĬVE-2024-0333 QtNetwork - potential buffer overflow qt5-network 5.15.12p148_1 qt6-base 6.6.1_2Ī potential integer overflow has been discovered in Qt's HTTP2 ![]() High CVE-2024-0333: Insufficient data validation in Extensions.CVE-2023-6129 chromium - security fix chromium 1.216 ungoogled-chromium 1.216 On PowerPC CPU based platforms if the CPU provides vector instructions. The POLY1305 MAC (message authentication code) implementationĬontains a bug that might corrupt the internal state of applications running ![]() Workspaces able to be created under different root namespaceĬommit signature validation ignores headers after signature CVE-2023-7028 CVE-2023-5356 CVE-2023-4812 CVE-2023-6955 CVE-2023-2030 OpenSSL - Vector register corruption on PowerPC openssl 3.0.12_2,1 openssl-quictls 3.0.12_2 openssl31 3.1.4_2 openssl31-quictls 3.1.4_2 openssl32 3.2.0_1
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |