Security news
Important information regarding Canon Product Printing product security, advisories, and notifications
Important information regarding Canon Product Printing product security, advisories, and notifications
Artifex Ghostscript versions prior to 10.02.0 can lead to remote code execution via crafted PostScript documents.
Curl heap based buffer overflow when asked to pass the host name to the SOCKS5 proxy to resolve address.
Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).
Certain versions of OpenSSL contain a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName.
Buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking.
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded.
File names of certificates being hashed were possibly passed to a command executed through the shell. Additionally, the RSA implementation causing memory corruption.
A flaw was found in Spring Security. When using RegexRequestMatcher, an easy misconfiguration can bypass some servlet containers.
Authorization Bypass Through User-Controlled Key in GitHub repository emickel/go-restful vulnerability.
For information about products and services from Canon Inc., please contact your local representatives or visit https://psirt.canon.
For information about products and services from other Canon Group companies, please contact your local representatives or visit their websites.