No Image

USN-4646-2: poppler regression

2020-11-27 KENNETH 0

USN-4646-2: poppler regression USN-4646-1 fixed vulnerabilities in poppler. The fix for CVE-2019-10871 introduced a regression causing certain applications linked against poppler to fail. This update backs out the fix pending further investigation. We apologize for the inconvenience. Original advisory details: It was discovered that Poppler incorrectly handled certain files. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service. Source: USN-4646-2: poppler regression

[도서] AutoCAD 오토캐드 2020 기계제도 입문서

2020-11-27 KENNETH 0

[도서] AutoCAD 오토캐드 2020 기계제도 입문서 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]AutoCAD 오토캐드 2020 기계제도 입문서 이원모,노수황,이예진 공저 | 메카피아 | 2021년 01월 판매가 26,600원 (5%할인) | YES포인트 560원(2%지급) CAD 입문자 뿐만 아니라 기존 하위 버전 사용자들도 상위 버전으로 무리없이 쉽게 접근할 수 있도록 하였으며 실무에서 많이 사용하는 핵심 기능과 명령어들 위주로 구성하여 학습 효율을 향상시키는 것에 초점을 두 Source: [도서] AutoCAD 오토캐드 2020 기계제도 입문서

No Image

USN-4649-1: xdg-utils vulnerability

2020-11-26 KENNETH 0

USN-4649-1: xdg-utils vulnerability Jens Mueller discovered that xdg-utils incorrectly handled certain URI. An attacker could possibly use this issue to expose sensitive information. Source: USN-4649-1: xdg-utils vulnerability

No Image

USN-4648-1: WebKitGTK vulnerabilities

2020-11-26 KENNETH 0

USN-4648-1: WebKitGTK vulnerabilities A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Source: USN-4648-1: WebKitGTK vulnerabilities

No Image

USN-4647-1: Thunderbird vulnerabilities

2020-11-26 KENNETH 0

USN-4647-1: Thunderbird vulnerabilities Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across origins, bypass security restrictions, conduct phishing attacks, conduct cross-site scripting (XSS) attacks, bypass Content Security Policy (CSP) restrictions, conduct DNS rebinding attacks, or execute arbitrary code. Source: USN-4647-1: Thunderbird vulnerabilities