Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories

Security Advisories

Here you'll find the latest security advisories from various Vendors.
Page: 123456 out of 846

Important rh-mariadb100-mariadb security update | RHSA-2016:1132-01 | May 26, 2016
* It was found that the MariaDB client library did not properly check host names against server identities noted in the X.509 certificates when establishing secure connections using TLS/SSL. A man-in-

GNU C Library vulnerabilities | USN-2985-1 | May 25, 2016

Samba regression | USN-2950-5 | May 25, 2016

Moderate jq security update | RHSA-2016:1106-01 | May 25, 2016
* A heap-based buffer overflow flaw was found in jq's tokenadd() function. By tricking a victim into processing a specially crafted JSON file, an attacker could use this flaw to crash jq or, potential

kernel 4.4.10 updates | FEDORA-2016-84fdc82b74 | May 25, 2016
The 4.4.10 update contains a number of important fixes across the tree

PHP vulnerabilities | USN-2984-1 | May 24, 2016

Important kernel security, bug fix, and enhancement update | RHSA-2016:1100-01 | May 24, 2016
* Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an inf

gsi-openssh 7.2p2 updates | FEDORA-2016-d31c00ca51 | May 24, 2016
Sync with openssh

websvn 2.3.3 updates | FEDORA-2016-0cb7475aa6 | May 24, 2016
Fix for CVE-2016-1236.

Moderate jq security update | RHSA-2016:1098-01 | May 24, 2016
* A heap-based buffer overflow flaw was found in jq's tokenadd() function. By tricking a victim into processing a specially crafted JSON file, an attacker could use this flaw to crash jq or, potential

Moderate jq security update | RHSA-2016:1099-01 | May 24, 2016
* A heap-based buffer overflow flaw was found in jq's tokenadd() function. By tricking a victim into processing a specially crafted JSON file, an attacker could use this flaw to crash jq or, potential

atheme-services security update | DSA 3586-1 | May 23, 2016

Important kernel security and bug fix update | RHSA-2016:1096-01 | May 23, 2016
* Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an inf

wireshark security update | DSA 3585-1 | May 22, 2016

rpm 4.12.0.1 updates | FEDORA-2016-927aade89c | May 22, 2016
* Fix sigsegv in stringFormat() (rhbz:1316903) * Fix reading rpmtd behind its size in formatValue() (rhbz:1316896)

moodle 2.9.6 updates | FEDORA-2016-286bacdbfb | May 21, 2016
Latest upstream.

cacti 0.8.8h updates | FEDORA-2016-879977eea0 | May 21, 2016
- Update to 0.8.8h - CVE-2016-3659

wordpress 4.5.2 updates | FEDORA-2016-cf91320535 | May 21, 2016
**WordPress 4.5.2** is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. See the [Release announcement](https://wordp

pgpdump 0.31 updates | FEDORA-2016-f2a1389f3e | May 21, 2016
fix possible buffer overflow

libndp 1.6 updates | FEDORA-2016-5cbcaebaf2 | May 21, 2016
Fix CVE-2016-3698

libndp 1.4 updates | FEDORA-2016-2be4263b24 | May 21, 2016
Fix CVE-2016-3698

Moderate Red Hat OpenShift Enterprise 3.1 security update | RHSA-2016:1095-01 | May 20, 2016
* An origin validation vulnerability was found in OpenShift Enterprise. An attacker could potentially access API credentials stored in a web browser's localStorage if anonymous access was granted to a

Important Red Hat OpenShift Enterprise 3.2 security update | RHSA-2016:1094-01 | May 20, 2016
* A vulnerability was found in the STI build process in OpenShift Enterprise. Access to STI builds was not properly restricted, allowing an attacker to use STI builds to access the Docker socket and e

librsvg security update | DSA 3584-1 | May 19, 2016

Firefox regression | USN-2936-3 | May 19, 2016

Page: 123456 out of 846

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »