DELTA 502718 0 25709 SVN† † ^Ÿ½„AŸ …ûK£R]https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10053 2019-05-26 2018-08-28 ™€† †  A €@rö†žNO@> password-store 1.7.2Ÿ † †   Y„®†Ÿ ing Types XSS¥À† † d€c†Ÿc/docs.djangoproject.com/en/1.11/releases/1.11.10/ https://docs.djangoproject.com/e«à† †  # ¢Nƒ«†Ÿ " issues. Reported by Tom Hutchison²€† †  U €Tv…džž6gTlities tcpdump 4.9.2¸ † † d€c†Ÿcery> 2017-06-21

OpenSSL reports:

fontconfig -- insufficiently cache file valid×À† † d€c†Ÿcerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt">

The Xerces-C XML parser fails to successÝà† †  - ¬N7†ž,dates>

The smka_decode_frame function in libavcodec/smacker.c in ý€† †  W„ÖŒ†Ÿ ARM Limited ƒ † † X€W‚q‚„@†œ8‚eW263bf5"> qemu, xen-tools -- use-after-free in QEMU/Xen block unplug protocol‰À† † d€c†Ÿcypervisor stack contents are copied into the destination of the operation, thus becoming visibà† † d€c†Ÿc

The open sourced vulnerability database repor–€† † d€c†Ÿc ppsspp 1.0.1_5 œ † † d€c†Ÿcs a non-cryptographic random number generator when generating symmetric keys.

The bu¢À† †   —zý†žo.ame> 0.9.14¨à† † d€c†Ÿces> file -- denial of ser¯€† †  # ¢…û6†žCZ"d6811f-1c75-11e3-ba72-98fc11cdc4f5µ † †   —r…w&1.3.01.5.0»À† † d€c†Ÿc

Host target list parsing routine in ettercap 0.7.4-series prior to 0.7.4.1 and 0.7.5-seriesÁà† † d€c†Ÿc1-0733 http://www.shmoo.com/mail/bugtraq/jun01/msg00286.shtml CVE-2012-0868 http://www.postgresql.org/about/news/1377/ 2011-01-20ဆ †  X €WN„܆ž[BW session uses an RC4 session key. Few application protocols use KRB-SAFE messagesç † † d€c†Ÿc tiff -- buffer overflow vulnerabiliíÀ† †   t„¶~†Ÿ óà† † d€c†Ÿc="http://secunia.com/advisories/20921">

infamous41md has reported a vulnerability in libwmf, ú€† †   L‚ @—†ŸANS reports:

31486 <‚†À† †  , «_«†žv'+ed to dereference a function pointer.)‚Œà† † d€c†Ÿc.net/ticket/89 https://bugzilla.redhat.com/show_bug.cgi?id=319301

Olivier Dobberkau, Andreas Otto, and Thorsten Kahler report:‚™ † † d€c†Ÿc http://lists.horde.org/archives/announce/2006/000307.htm‚ŸÀ† † d€c†Ÿcl>http://secunia.com/advisories/21009/ http://jvn.jp/jp/JVN%2383768862/index.html<‚¥à† † d€c†Ÿcorted in Dia, which potentially can be exploited by malicious people to compromise a user‚¬€† † d€c†Ÿcquires that the user has access to the full HTML input format. Ref: sa-2005-007

xloadimage 4.1.9‚¾à† † d€c†Ÿcno reports of machines compromised as a result of the now-remedied vulnerabilities. Rea‚Å€† † d€c†Ÿc5-01-12 2005-01-22