-
The function IsDirectory() in filesystem_posix.cc writes outside the bounds of st_qspare on line 133, which could corrupt data, cause the program to crash, or lead to the execution of malicious code.T…
-
Kernel: linux 5.11.3
btrfs-progs version: git devel 26ddd8d9001861c22
relevant part of config.log:
```
configure:6855: checking for EXT4_EPOCH_MASK defined in ext2fs/ext2_fs.h
configure:6878: gcc…
-
On line 420 of EVReflectable.swift, the method saveToTemp:_:() writes data to a file lacking sufficient encryption settings.The identified method writes data to a file lacking sufficient encryption se…
-
## Essential information
Page to Migrate: https://wiki.jenkins.io/display/JENKINS/Fortify+On+Demand+Uploader+Plugin
Redirect to the destination: https://plugins.jenkins.io/fortify-on-demand-uploader…
getJv updated
4 years ago
-
- Program: Authoritative
- Issue type: compile bug report
### Short description
### Environment
- Operating system: Debian unstable
- Software version: 4.4.0-beta1
- Softw…
-
The call to dataTaskWithRequest:completionHandler:() in FIRInstanceIDTokenDeleteOperation.m on line 87 initiates an SSL/TLS connection using the default pre-loaded system Certificate Authorities (CAs)…
-
The function GPBSetHasIvar() in GPBUtilities.m writes outside the bounds of has_storage on line 322, which could corrupt data, cause the program to crash, or lead to the execution of malicious code.Th…
-
Attackers are able to control the file system path argument to removeItemAtURL:error:() at GTMSessionUploadFetcher.m line 1565, which allows them to access or modify otherwise protected files.Attacker…
-
The call to init^:configuration:delegate:serverTrustPolicyManager:() initiates an SSL/TLS connection using the default pre-loaded system Certificate Authorities (CAs) that might enable attackers to i…
-
Hardcoded encryption keys can compromise security in a way that cannot be easily remedied.
In this case, the encryption key is located at strcmp() in compression_args.cc at line 68.
the encryption…