This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJune 08, 2022
This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJune 08, 2022
This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJune 08, 2022
This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJune 08, 2022
pyanxdns package in PyPI version 0.2 is vulnerable to code execution backdoor. The impact is: execute arbitrary code (remote). When installing the pyanxdns package of version 0.2, the request package ...
Continue ReadingJune 08, 2022
[![](https://blogger.googleusercontent.com/img/a/AVvXsEhjTayZlPb6iJTaFuvS67_58lpU1-HTXZ6RgNNu4ufeETtb47TqydYCoerWh0c4zUH2yauB9rSeE3hRO3BkZGs2ilX9pZLliPk1iFzI-IxYT2uKAyCIr6uJKt5Rj8_bck8nNEWBBhCCBsVOS-U ...
Continue ReadingJune 08, 2022
GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, iso ...
Continue ReadingJune 08, 2022
The keep for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.Read More ...
Continue ReadingJune 08, 2022
Back to Main