Clipboard Express Pro 2.7.11 serial key or number

Clipboard Express Pro 2.7.11 serial key or number

Clipboard Express Pro 2.7.11 serial key or number

Clipboard Express Pro 2.7.11 serial key or number

NameDescriptionCVEActive IQ Unified Manager for VMware vSphere and Windows versions prior to are susceptible to a vulnerability which allows administrative users to cause Denial of Service (DoS). CVEAn exploitable memory corruption vulnerability exists in AMD atidxxdll graphics driver. A specially crafted pixel shader can cause memory corruption vulnerability. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability potentially could be triggered from guest machines running virtualization environments (ie. VMware, qemu, VirtualBox etc.) in order to perform guest-to-host escape - as it was demonstrated before (TALOS, TALOS, etc.). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly). This vulnerability was triggered from HYPER-V guest using RemoteFX feature leading to executing the vulnerable code on the HYPER-V host (inside of the hasu.com.ar process). CVEVMware Tanzu Application Service for VMs (x versions prior to , x versions prior to , and x versions prior to ) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions , , and Note that these logs are typically only visible to foundation administrators and operators. CVEVMware Tanzu Application Service for VMs, x versions prior to , x versions prior to , and x versions prior to , includes a version of PCF Autoscaling that writes database connection properties to its log, including database username and password. A malicious user with access to those logs may gain unauthorized access to the database being used by Autoscaling. CVEVMware GemFire versions prior to , , , and , and VMware Tanzu GemFire for VMs versions prior to and , when deployed without a SecurityManager, contain a JMX service available which contains an insecure default configuration. This allows a malicious user to create an MLet mbean leading to remote code execution. CVEVMware Workstation (x) and Horizon Client for Windows (5.x before ) contain an information disclosure vulnerability due to an integer overflow issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon Client. CVEVMware Workstation (x) and Horizon Client for Windows (5.x before ) contain a denial of service vulnerability due to an out-of-bounds write issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue to create a partial denial-of-service condition on the system where Workstation or Horizon Client for Windows is installed. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon Client. CVEVMware Workstation (x) and Horizon Client for Windows (5.x before ) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (JPEG parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed. CVEVMware Workstation (x) and Horizon Client for Windows (5.x before ) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMR STRETCHDIBITS parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed. CVEVMware Workstation (x) and Horizon Client for Windows (5.x before ) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMF Parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed. CVEVMware Fusion (x) contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where Fusion is installed. CVEVMware ESXi and vCenter Server contain a partial denial of service vulnerability in their respective authentication services. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of CVEVMware App Volumes 2.x prior to and VMware App Volumes 4 prior to contain a Stored Cross-Site Scripting (XSS) vulnerability. A malicious actor with access to create and edit applications or create storage groups, may be able to inject malicious script which will be executed by a victim's browser when viewing. CVEVMware Fusion (x before ), VMware Remote Console for Mac (x and prior before ) and Horizon Client for Mac (5.x and prior before ) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed. CVEVMware Tools for macOS (x.x and prior before ) contains a denial-of-service vulnerability in the Host-Guest File System (HGFS) implementation. Successful exploitation of this issue may allow attackers with non-admin privileges on guest macOS virtual machines to create a denial-of-service condition on their own VMs. CVEVMware ESXi ( before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain an out-of-bounds read vulnerability in the Shader functionality. A malicious actor with non-administrative local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to crash the virtual machine's vmx process leading to a partial denial of service condition. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain an off-by-one heap-overflow vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain an out-of-bounds write vulnerability in the USB controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine's vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain a heap-overflow vulnerability in the USB controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain a heap-overflow due to a race condition issue in the USB controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor's memory. Additional conditions beyond the attacker's control need to be present for exploitation to be possible. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain a use-after-free vulnerability in PVNVRAM. A malicious actor with local access to a virtual machine may be able to read privileged information contained in physical memory. CVEVMware ESXi ( before ESXi_, before ESXiSG and before ESXiSG), Workstation (x before ), and Fusion (x before ) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. CVEVMware Horizon Client for Windows (prior to ) contains a privilege escalation vulnerability due to folder permission configuration and unsafe loading of libraries. A local user on the system where the software is installed may exploit this issue to run commands as any user. CVEVMware ESXi ( before ESXiSG and before ESXiSG), VMware Workstation (x before ) and VMware Fusion (x before ) contain a memory leak vulnerability in the VMCI module. A malicious actor with local non-administrative access to a virtual machine may be able to crash the virtual machine's vmx process leading to a partial denial of service. CVEVMware ESXi ( before ESXiSG and before ESXiSG), VMware Workstation (x before ) and VMware Fusion (x before ) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with non-administrative access to a virtual machine to crash the virtual machine's vmx process leading to a denial of service condition. CVEVMware Fusion (x before ), VMware Remote Console for Mac (x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed. CVEVMware Cloud Director x before , x before , x before , and x before do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traffic to VMware Cloud Director which may lead to arbitrary remote code execution. This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access. CVEESXi without patch ESXiSG and ESXi without patch ESXiSG do not properly neutralize script-related HTML when viewing virtual machines attributes. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of CVEOpen Redirect vulnerability exists in VMware vRealize Log Insight prior to due to improper Input validation. CVECross Site Scripting (XSS) vulnerability exists in VMware vRealize Log Insight prior to due to improper Input validation. CVEUnder certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls. CVEVMware Workstation (x before ) and Horizon Client for Windows (5.x and prior before ) contain a denial-of-service vulnerability due to a heap-overflow issue in Cortado Thinprint. Attackers with non-administrative access to a guest VM with virtual printing enabled may exploit this issue to create a denial-of-service condition of the Thinprint service running on the system where Workstation or Horizon Client is installed. CVEVMware Fusion (x before ), VMware Remote Console for Mac (x and prior before ) and Horizon Client for Mac (5.x and prior before ) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed. CVELinux Guest VMs running on VMware Workstation (x before ) and Fusion (x before ) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM. CVEVMware Workstation (x before ) and Fusion (x before ) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine. CVEThe repair operation of VMware Tools for Windows x.y has a race condition which may allow for privilege escalation in the Virtual Machine where Tools is installed. This vulnerability is not present in VMware Tools x.y since the affected functionality is not present in VMware Tools CVEVMware Workspace ONE SDK and dependent mobile application updates address sensitive information disclosure vulnerability. CVEA vulnerability in the Secure Login Enhancements capability of Cisco Nexus V Switch for VMware vSphere could allow an unauthenticated, remote attacker to cause an affected Nexus V Virtual Supervisor Module (VSM) to become inaccessible to users through the CLI. The vulnerability is due to improper resource allocation during failed CLI login attempts when login parameters that are part of the Secure Login Enhancements capability are configured on an affected device. An attacker could exploit this vulnerability by performing a high amount of login attempts against the affected device. A successful exploit could cause the affected device to become inaccessible to other users, resulting in a denial of service (DoS) condition requiring a manual power cycle of the VSM to recover. CVEA potential security vulnerability has been identified in Hewlett Packard Enterprise Universal API Framework. The vulnerability could be remotely exploited to allow SQL injection in HPE Universal API Framework for VMware Esxi v and HPE Universal API Framework for Microsoft Hyper-V (VHD). CVEA sandbox escape issue was discovered in TitanHQ SpamTitan Gateway It limits the admin user to a restricted shell, allowing execution of a small number of tools of the operating system. The restricted shell can be bypassed by presenting a fake vmware-tools ISO image to the guest virtual machine running SpamTitan Gateway. This ISO image should contain a valid Perl script at the vmware-freebsd-tools/vmware-tools-distrib/hasu.com.ar path. The fake ISO image will be mounted and the script hasu.com.ar will be executed with super-user privileges as soon as the hidden option to install VMware Tools is selected in the main menu of the restricted shell (option number 5). The contents of the script can be whatever the attacker wants, including a backdoor or similar. CVEIn Redgate SQL Monitor through (inclusive), the scope for disabling some TLS security certificate checks can extend beyond that defined by various options on the Configuration > Notifications pages to disable certificate checking for alert notifications. These TLS security checks are also ignored during monitoring of VMware machines. This would make SQL Monitor vulnerable to potential man-in-the-middle attacks when sending alert notification emails, posting to Slack or posting to webhooks. The vulnerability is fixed in version CVEA vulnerability in SonicOS allow authenticated read-only admin can elevate permissions to configuration mode. This vulnerability affected SonicOS Gen 5 version o and earlier, Gen 6 version n, n, n, n, n, n, n, n and SonicOSv v_RC (VMWARE), v_RC (AZURE), SonicOSv v_RC (AWS), SonicOSv v_RC (HYPER_V). CVEA vulnerability in SonicWall SonicOS and SonicOSv TLS CBC Cipher allow remote attackers to obtain sensitive plaintext data when CBC cipher suites are enabled. This vulnerability affected SonicOS Gen 5 version and earlier, Gen 6 version , , , , , , , o and SonicOSv v_RC (VMWARE), v_RC (AZURE), SonicOSv v_RC (AWS), SonicOSv v_RC (HYPER_V). CVEA vulnerability in SonicWall SonicOS and SonicOSv with management enabled system on specific configuration allow unprivileged user to access advanced routing services. This vulnerability affected SonicOS Gen 5 version and earlier, Gen 6 version , , , , , , , o and SonicOSv v_RC (VMWARE), v_RC (AZURE), SonicOSv v_RC (AWS), SonicOSv v_RC (HYPER_V). CVEA vulnerability in SonicWall SonicOS and SonicOSv, allow authenticated read-only admin to leave the firewall in an unstable state by downloading certificate with specific extension. This vulnerability affected SonicOS Gen 5 version and earlier, Gen 6 version , , , , , , , o and SonicOSv v_RC (VMWARE), v_RC (AZURE), SonicOSv v_RC (AWS), SonicOSv v_RC (HYPER_V). CVEAn XML External Entity (XXE) processing vulnerability was reported in Lenovo XClarity Administrator (LXCA) prior to version , Lenovo XClarity Integrator (LXCI) for Microsoft System Center prior to version , and Lenovo XClarity Integrator (LXCI) for VMWare vCenter prior to version that could allow information disclosure. CVErunc through rc6, as used in Docker before and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe. CVEOpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of CVEFor VMware Horizon Client for Windows (5.x and prior before ), VMware Remote Console for Windows (x before ), VMware Workstation for Windows (x before ) the folder containing configuration files for the VMware USB arbitration service was found to be writable by all users. A local user on the system where the software is installed may exploit this issue to run commands as any user. CVEVMware Workstation (x before ) and Fusion (x before ) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. CVEVMware Workstation (x before ) and Fusion (x before ) contain an out-of-bounds write vulnerability in the ee virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition on their own VM. CVEVMware Workstation (x before ) and Fusion (x before ) contain an information disclosure vulnerability in vmnetdhcp. Successful exploitation of this issue may allow an attacker on a guest VM to disclose sensitive information by leaking memory from the host process. CVEVMware Workstation (x prior to ) and Horizon View Agent (x prior to and x prior to ) contain a DLL hijacking vulnerability due to insecure loading of a DLL by Cortado Thinprint. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to administrator on a Windows machine where Workstation or View Agent is installed. CVESensitive information disclosure vulnerability resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance ( before u3a and before u3d) may allow a malicious actor to intercept sensitive data in transit over SCP. A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations. CVESensitive information disclosure vulnerability resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance ( before u3a and before u3d) may allow a malicious actor to intercept sensitive data in transit over FTPS and HTTPS. A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations. CVEVMware ESXi ( before ESXiSG and before ESXiSG), Workstation (x before ) and Fusion (x before ) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion. CVEVMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of CVEVMware vCenter Server (x prior to U3, prior to U3 and prior to U3j) contains an information disclosure vulnerability where Virtual Machines deployed from an OVF could expose login information via the virtual machine's vAppConfig properties. A malicious actor with access to query the vAppConfig properties of a virtual machine deployed from an OVF may be able to view the credentials used to deploy the OVF (typically the root account of the virtual machine). CVEIn VMware SD-WAN by VeloCloud versions 3.x prior to , the VeloCloud Orchestrator parameter authorization check mistakenly allows enterprise users to obtain information of Managed Service Provider accounts. Among the information is username, first and last name, phone numbers and e-mail address if present but no other personal data. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of CVEVMware vCenter Server (x prior to U3, prior to U3 and prior to U3j) contains an information disclosure vulnerability due to the logging of credentials in plain-text for virtual machines deployed through OVF. A malicious user with access to the log files containing vCenter OVF-properties of a virtual machine deployed from an OVF may be able to view the credentials used to deploy the OVF (typically the root account of the virtual machine). CVEVMware vSphere ESXi ( prior to ESXiSG, prior to ESXiSG, and prior to ESXiSG) and VMware vCenter Server ( prior to U1b, prior to U2b, and prior to U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user&#;s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out. CVEVMware ESXi suffers from partial denial of service vulnerability in hostd process. Patch ESXiUG for this issue is available. CVEESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of CVEVMware Workstation (x before ) contains a DLL hijacking issue because some DLL files are improperly loaded by the application. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to administrator on a windows host where Workstation is installed. CVEVMware Workstation (x before ) contains a use-after-free vulnerability in the Advanced Linux Sound Architecture (ALSA) backend. A malicious user with normal user privileges on the guest machine may exploit this issue in conjunction with other issues to execute code on the Linux host where Workstation is installed. CVEVMware Workstation (x before ) and Fusion (x before ) contain an out-of-bounds write vulnerability in the e virtual network adapter. This issue may allow a guest to execute code on the host. CVEVMware vCloud Director for Service Providers x prior to update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session. CVEVMware Tools for Windows update addresses an out of bounds read vulnerability in vm3dmp driver which is installed with vmtools in Windows guest machines. This issue is present in versions x and x prior to A local attacker with non-administrative access to a Windows guest with VMware Tools installed may be able to leak kernel information or create a denial of service attack on the same Windows guest machine. CVEVMware ESXi ( before ESXiSG and before ESXi), Workstation (x before and x before ) and Fusion (x before and x before ) contain an out-of-bounds read vulnerability in the pixel shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion. CVEVMware ESXi ( before ESXiSG and before ESXi), Workstation (x before and x before ), Fusion (x before and x before ) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information hasu.com.ar workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion. CVEVMware ESXi ( before ESXi, before ESXi, before ESXi), Workstation (x before , x before ), Fusion (x before , x before ) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host. CVEVMware ESXi ( before ESXi, before ESXi, before ESXi), Workstation (x before , x before ), Fusion (x before , x before ) contain an out-of-bounds read/write vulnerability in the virtual USB UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host. CVEVMware ESXi ( before ESXiSG and before ESXi), Workstation (x before and x before ), Fusion (x before and x before ) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion. CVEVMware ESXi ( before ESXiSG and before ESXi), Workstation (x before and x before ), Fusion (x before and x before ) updates address an out-of-bounds vulnerability with the vertex shader functionality. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion. CVEVMware Workstation (x before , x before ) and Fusion (x before , x before ) updates address an out-of-bounds write vulnerability in the e and ee virtual network adapters. Exploitation of this issue may lead to code execution on the host from the guest but it is more likely to result in a denial of service of the guest. CVEVMware VMware Fusion (x before ) contains a security vulnerability due to certain unauthenticated APIs accessible through a web socket. An attacker may exploit this issue by tricking the host user to execute a JavaScript to perform unauthorized functions on the guest machine where VMware Tools is installed. This may further be exploited to execute commands on the guest machines. CVEVMware Horizon Connection Server (7.x before , x before , 6.x before ) contains an information disclosure vulnerability. Successful exploitation of this issue may allow disclosure of internal domain names, the Connection Server&#;s internal name, or the gateway&#;s internal IP address. CVEVMware Workstation (x before , x before ) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege. CVEVMware Workstation (x before , x before ) running on Windows does not handle paths appropriately. Successful exploitation of this issue may allow the path to the VMX executable, on a Windows host, to be hijacked by a non-administrator leading to elevation of privilege. CVEOnCommand Unified Manager for VMware vSphere, Linux and Windows prior to shipped without certain HTTP Security headers configured which could allow an attacker to obtain sensitive information via unspecified vectors. CVEAn exploitable type confusion vulnerability exists in AMD ATIDXXDLL driver, versions , and A specially crafted pixel shader can cause a type confusion issue, leading to potential code execution. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host. CVEAn exploitable out-of-bounds read vulnerability exists in AMD ATIDXXDLL driver, version A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host. CVEAn exploitable out-of-bounds read vulnerability exists in AMD ATIDXXDLL driver, version A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host. CVEAn exploitable out-of-bounds read vulnerability exists in AMD ATIDXXDLL driver, version A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host. CVEAn exploitable out-of-bounds read vulnerability exists in AMD ATIDXXDLL driver, version A specially crafted pixel shader can cause out-of-bounds memory read. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host. CVEAn exploitable memory corruption vulnerability exists in AMD ATIDXXDLL driver, versions and A specially crafted pixel shader can cause an out-of-bounds memory write. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host. CVECloud Native Computing Foundation Harbor prior to and allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform. CVECloud Native Computing Foundation Harbor prior to and allows SQL Injection via project quotas in the VMware Harbor Container Registry for the Pivotal Platform. CVECloud Native Computing Foundation Harbor prior to and allows CSRF in the VMware Harbor Container Registry for the Pivotal Platform. CVECloud Native Computing Foundation Harbor prior to and has a Privilege Escalation Vulnerability in the VMware Harbor Container Registry for the Pivotal Platform. CVECentreon Web has weak permissions within the OVA (aka VMware virtual machine) and OVF (aka VirtualBox virtual machine) files, allowing attackers to gain privileges via a Trojan horse Centreon-autodisco executable file that is launched by cron. CVEA vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition. Note: This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device. Nexus V Switch for Microsoft Hyper-V is affected in versions prior to (1)SM3(). Nexus V Switch for VMware vSphere is affected in versions prior to (1)SV3(a). Nexus Series Switches are affected in versions prior to (3)I7(6) and (2). Nexus Platform Switches are affected in versions prior to (2)A8(11), (3)I7(6), and (2). Nexus Platform Switches are affected in versions prior to (3)F3(5) and (2). Nexus , , and Series Switches are affected in versions prior to (5)N1(1b) and (5)N1(1). Nexus and Series Switches are affected in versions prior to ( Nexus R-Series Line Cards and Fabric Modules are affected in versions prior to (3)F3(5) and (2). UCS and Series Fabric Interconnect are affected in versions prior to (3j) and (2a). UCS Series Fabric Interconnect are affected in versions prior to (2a). CVEA vulnerability in the X implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete input validation of Extensible Authentication Protocol over LAN (EAPOL) frames. An attacker could exploit this vulnerability by sending a crafted EAPOL frame to an interface on the targeted device. A successful exploit could allow the attacker to cause the Layer 2 (L2) forwarding process to restart multiple times, leading to a system-level restart of the device and a DoS condition. Note: This vulnerability affects only NX-OS devices configured with X functionality. Cisco Nexus V Switch for VMware vSphere devices are affected in versions prior to (1)SV3(b). Nexus Series Switches are affected in versions prior to (3)I7(4). Nexus Platform Switches are affected in versions prior to (3)I7(4). Nexus , , , and Series Switches are affected in versions prior to (5)N1(1) and (5)N1(1b). Nexus and Series Switches are affected in versions prior to (3). Nexus Series Fabric Switches in ACI Mode are affected in versions prior to (1l). Nexus Series Switches in Standalone NX-OS Mode are affected in versions prior to (3)I7(4). CVEIn Sudo before , an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. CVEA security vulnerability in HPE OneView for VMware vCenter could be exploited remotely to allow Cross-Site Scripting. CVEJonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases , , , , , and is fixed in commit fef2acbfb0baf55fa2e. CVEJonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases , , , , , and is fixed in commit 3bf65b0df19acd88ed1a2f78cff. CVEVMware GemFire versions prior to , , , and , and VMware Tanzu GemFire for VMs versions prior to , , , and , contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution. CVEJenkins VMware Lab Manager Slaves Plugin and earlier disables SSL/TLS and hostname verification globally for the Jenkins master JVM. CVEA missing permission check in Jenkins VMware Lab Manager Slaves Plugin in the hasu.com.arptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. CVEA cross-site request forgery vulnerability in Jenkins VMware Lab Manager Slaves Plugin in the hasu.com.arptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server. CVEJenkins VMware vRealize Automation Plugin stores credentials unencrypted in job hasu.com.ar files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. CVEIn SonicWall SonicOS, administrators without full permissions can download imported certificates. Occurs when administrators who are not in the SonicWall Administrators user group attempt to download imported certificates. This vulnerability affected SonicOS Gen 5 version and earlier, Gen 6 version , , , , , , , o and SonicOSv v_RC (VMWARE), v_RC (AZURE), SonicOSv v_RC (AWS), SonicOSv v_RC (HYPER_V). CVEIn versions prior to , LXCI for VMware allows an authenticated user to download any system file due to insufficient input sanitization during file downloads. CVEVMware Workstation (x before and x before ) and Fusion (x before and x before ) contain an integer overflow vulnerability in the virtual network devices. This issue may allow a guest to execute code on the host. CVEVMware ESXi without ESXiBG and VMware ESXi without ESXiBG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest. CVEVMware ESXi without ESXiBG and VMware ESXi without ESXiBG, VMware ESXi without ESXiBG, VMware Workstation 15, VMware Workstation or below, VMware Fusion 11, VMware Fusion or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host. CVEVMware vRealize Log Insight (x before and x before ) contains a vulnerability due to improper authorization in the user registration method. Successful exploitation of this issue may allow Admin users with view only permission to perform certain administrative functions which they are not allowed to perform. CVEThe VMware Workspace ONE Unified Endpoint Management Console (A/W Console) x prior to , x prior to , x prior to , x prior to , x prior to , x prior to , and x prior to contains a SAML authentication bypass vulnerability which can be leveraged during device enrollment. This vulnerability may allow for a malicious actor to impersonate an authorized SAML session if certificate-based authentication is enabled. This vulnerability is also relevant if certificate-based authentication is not enabled, but the outcome of exploitation is limited to an information disclosure (Important Severity) in those cases. CVEVMware ESXi (, , ), Workstation (x and x) and Fusion (x and x) contain a denial-of-service vulnerability due to an infinite loop in a 3D-rendering shader. Successfully exploiting this issue may allow an attacker with normal user privileges in the guest to make the VM unresponsive, and in some cases, possibly result other VMs on the host or the host itself becoming unresponsive. CVEThe VMware Content Locker for iOS prior to contains a data protection vulnerability in the SQLite database. This vulnerability relates to unencrypted filenames and associated metadata in SQLite database for the Content Locker. CVEVMware ESXi ( before ESXiSG, before ESXiBG, and before ESXiBG), Workstation (x before ) and Fusion (x before ) contain an out-of-bounds read vulnerability in SVGA device. This issue may allow a guest to execute code on the host. CVEVMware Workstation (x before ) and Fusion (x before ) contain an out-of-bounds write vulnerability in the e device. This issue may allow a guest to execute code on the host. CVEVMware ESXi ( before ESXiBG, before ESXiBG, before ESXiBG and before ESXiBG), Workstation (x before ), and Fusion (x before ) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs. CVEVMware Horizon View Agents (7.x.x before ) contain a local information disclosure vulnerability due to insecure logging of credentials in the hasu.com.ar file when an account other than the currently logged on user is specified during installation (including silent installations). Successful exploitation of this issue may allow low privileged users access to the credentials specified during the Horizon View Agent installation. CVEVMware Horizon 6 (6.x.x before ), Horizon 7 (7.x.x before ), and Horizon Client (4.x.x and prior before ) contain an out-of-bounds read vulnerability in the Message Framework library. Successfully exploiting this issue may allow a less-privileged user to leak information from a privileged process running on a system where Horizon Connection Server, Horizon Agent or Horizon Client are installed. Note: This issue doesn't apply to Horizon 6, 7 Agents installed on Linux systems or Horizon Clients installed on non-Windows systems. CVEVMware Tools (x and prior before ) contains an out-of-bounds read vulnerability in HGFS. Successful exploitation of this issue may lead to information disclosure or may allow attackers to escalate their privileges on the guest VMs. In order to be able to exploit this issue, file sharing must be enabled. CVEThe VMware AirWatch Agent for Android prior to and AirWatch Agent for Windows Mobile prior to contain a remote code execution vulnerability in real time File Manager capabilities. This vulnerability may allow for unauthorized creation and execution of files in the Agent sandbox and other publicly accessible directories such as those on the SD card by a malicious administrator. CVEVMware ESXi ( before ESXiBG), Workstation (x before ), and Fusion (x before ) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE and CVE CVEVMware ESXi ( before ESXiBG), Workstation (x before ), and Fusion (x before ) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE and CVE CVEVMware ESXi ( before ESXiBG), Workstation (x before ), and Fusion (x before ) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE and CVE CVEVMware Horizon Client for Linux (4.x before and prior) contains a local privilege escalation vulnerability due to insecure usage of SUID binary. Successful exploitation of this issue may allow unprivileged users to escalate their privileges to root on a Linux machine where Horizon Client is installed. CVEVMware Workstation (x before ) and Fusion (x before ) contain multiple denial-of-service vulnerabilities that occur due to NULL pointer dereference issues in the RPC handler. Successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-Service of their guest machine. CVEVMware Fusion (x before ) contains a signature bypass vulnerability which may lead to a local privilege escalation. CVEVMware NSX SD-WAN Edge by VeloCloud prior to version contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution. CVEVMware Horizon DaaS (7.x before ) contains a broken authentication vulnerability that may allow an attacker to bypass two-factor authentication. Note: In order to exploit this issue, an attacker must have a legitimate account on Horizon DaaS. CVEVMware vRealize Automation (vRA) prior to contains a vulnerability in the handling of session IDs. Exploitation of this issue may lead to the hijacking of a valid vRA user's session. CVEVMware vRealize Automation (vRA) prior to contains a vulnerability that may allow for a DOM-based cross-site scripting (XSS) attack. Exploitation of this issue may lead to the compromise of the vRA user's workstation. CVEVMware Workstation (x before , x) and Fusion (x before and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled. CVELXCI for VMware versions prior to and LXCI for Microsoft System Center versions prior to , allow an authenticated user to write to any system file due to insufficient sanitization during the upload of a certificate. CVEIn versions prior to , LXCI for VMware allows an authenticated user to write to any system file due to insufficient sanitization during the upload of a backup file. CVEA vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system memory on an affected device, which could cause a denial of service (DoS) condition. The vulnerability is due to the affected software improperly handling changes to SSL connection states. An attacker could exploit this vulnerability by sending crafted SSL connections through an affected device. A successful exploit could allow the attacker to cause the detection engine to consume excessive system memory on the affected device, which could cause a DoS condition. The device may need to be reloaded manually to recover from this condition. This vulnerability affects Cisco Firepower System Software Releases and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) X Series Firewalls with FirePOWER Services, Adaptive Security Appliance (ASA) X Series Next-Generation Firewalls, Advanced Malware Protection (AMP) for Networks, Series Appliances, Advanced Malware Protection (AMP) for Networks, Series Appliances, Firepower Series Appliances, FirePOWER Series Appliances, FirePOWER Series Appliances, Firepower Series Security Appliances, Firepower Threat Defense for Integrated Services Routers (ISRs), Firepower Threat Defense Virtual for VMware, Industrial Security Appliance , Sourcefire 3D System Appliances. Cisco Bug IDs: CSCve CVEBitdefender GravityZone VMware appliance before might allow attackers to gain access with root privileges via unspecified vectors. CVEThe sudo helper in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) before allows local users to gain root privileges by leveraging failure to verify the path to the encoded ruby script or scrub the PATH variable. CVEVMware Xenon 1.x, prior to CR7_1, _7, CR6_2, CR1_2, CR, CR3_1,CR4_1, and _8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure. CVEVMware AirWatch Console (x before and x before ) contains a Cross Site Request Forgery vulnerability when accessing the App Catalog. An attacker may exploit this issue by tricking users into installing a malicious application on their devices. CVEVMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default. CVEVMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default. CVEVMware Workstation (x before and x) and Horizon View Client (4.x before ) contain an out-of-bounds read vulnerability in hasu.com.ar On Workstation, this issue in conjunction with other bugs may allow a guest to leak information from host or may allow for a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this issue in conjunction with other bugs may allow a View desktop to leak information from host or may allow for a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View. CVEVMware Realize Automation ( and ) and vSphere Integrated Containers (1.x before ) contain a deserialization vulnerability via Xenon. Successful exploitation of this issue may allow remote attackers to execute arbitrary code on the appliance. CVEThe VMware V4H and V4PA desktop agents (6.x before ) contain a privilege escalation vulnerability. Successful exploitation of this issue could result in a low privileged windows user escalating their privileges to SYSTEM. CVEVMware Workstation (x and x) and Fusion (x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to for each VM to resolve CVE VMware Tools is consumed by Workstation and Fusion by default. CVEVMware vCenter Server Appliance (vCSA) ( before U1d) contains a local privilege escalation vulnerability via the 'showlog' plugin. Successful exploitation of this issue could result in a low privileged user gaining root level privileges over the appliance base OS. CVEVMware AirWatch Console (AWC) contains a Broken Access Control vulnerability. Successful exploitation of this issue could result in end-user device details being disclosed to an unauthorized administrator. CVEVMware ESXi ( before ESXiSG, ESXiSG), Workstation (x before ), and Fusion (8.x before ) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall. CVEThe ESXi Host Client in VMware ESXi ( before ESXiSG, before ESXiSG and before ESXiSG) contains a vulnerability that may allow for stored cross-site scripting (XSS). An attacker can exploit this vulnerability by injecting Javascript, which might get executed when other users access the Host Client. CVEVMware Workstation (x before ) installer contains a DLL hijacking issue that exists due to some DLL files loaded by the application improperly. This issue may allow an attacker to load a DLL file of the attacker's choosing that could execute arbitrary code. CVEVMware Workstation (x before ) and Fusion (8.x before ) contain a guest RPC NULL pointer dereference vulnerability. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs. CVEVMware Workstation (x before ) and Horizon View Client for Windows (4.x before ) contain an out-of-bounds read vulnerability in JPEG parser in the hasu.com.ar On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View Client. CVEVMware Workstation (x before ) and Horizon View Client for Windows (4.x before ) contain an out-of-bounds read vulnerability in JPEG parser in the hasu.com.ar On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. CVEVMware Workstation (x before ) and Horizon View Client for Windows (4.x before ) contain an out-of-bounds write vulnerability in JPEG parser in the hasu.com.ar On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View Client. CVEVMware Workstation (x before ) and Fusion (8.x before ) contain a heap buffer-overflow vulnerability in VMNAT device. This issue may allow a guest to execute code on the host. CVEVMware ESXi ( before ESXiBG), Workstation (x before ), and Fusion (8.x before ) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall. CVEVMware AirWatch Launcher for Android prior to contains a vulnerability that could allow an escalation of privilege from the launcher UI context menu to native UI functionality and privilege. Successful exploitation of this issue could result in an escalation of privilege. CVEVMware AirWatch Console 9.x prior to contains a vulnerability that could allow an authenticated AWC user to add malicious data to an enrolled device's log files. Successful exploitation of this issue could result in an unsuspecting AWC user opening a CSV file which contains malicious content. CVEVMware AirWatch Console 9.x prior to contains a vulnerability that could allow an authenticated AWC user to add a malicious URL to an enrolled device's 'Links' page. Successful exploitation of this issue could result in an unsuspecting AWC user being redirected to a malicious URL. CVEVMware NSX Edge (x before and x before ) contains a moderate Cross-Site Scripting (XSS) issue which may lead to information disclosure. CVEVMware vCenter Server ( prior to U1 and prior to U3c) does not correctly handle specially crafted LDAP network packets which may allow for remote denial of service. CVEVMware vCenter Server ( prior to U1) contains a vulnerability that may allow for stored cross-site scripting (XSS). An attacker with VC user privileges can inject malicious java-scripts which will get executed when other VC users access the page. CVEVMware ESXi without patch ESXiSG, ESXi without patch ESXiSG, ESXi without patch ESXiSG, Workstation (x before ), Fusion (8.x before ) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs. CVEVMware ESXi (ESXi without patch ESXiSG), Workstation (x before ) and Fusion (8.x before ) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host. CVEVMware vCenter Server ( prior to U1) contains an information disclosure vulnerability. This issue may allow plaintext credentials to be obtained when using the vCenter Server Appliance file-based backup feature. CVEVMware vCenter Server ( prior to U1) contains an information disclosure issue due to the service startup script using world writable directories as temporary storage for critical information. Successful exploitation of this issue may allow unprivileged host users to access certain critical information when the service gets restarted. CVEVMware vCenter Server ( prior to U1) contains an insecure library loading issue that occurs due to the use of LD_LIBRARY_PATH variable in an unsafe manner. Successful exploitation of this issue may allow unprivileged host users to load a shared library that may lead to privilege escalation. CVEThe implementation of the OSPF protocol in VMware NSX-V Edge x prior to and NSX-V Edge x prior to doesn't correctly handle the link-state advertisement (LSA). A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity. CVEVMware vCenter Server , , allows vSphere users with certain, limited vSphere privileges to use the VIX API to access Guest Operating Systems without the need to authenticate. CVEVMware Horizon View Client (2.x, 3.x and 4.x prior to ) contains a command injection vulnerability in the service startup script. Successful exploitation of this issue may allow unprivileged users to escalate their privileges to root on the Mac OSX system where the client is installed. CVEVMware vSphere Data Protection (VDP) x, x, x, and x locally stores vCenter Server credentials using reversible encryption. This issue may allow plaintext credentials to be obtained. CVEVMware Workstation Pro/Player contains a NULL pointer dereference vulnerability that exists in the vstor2 driver. Successful exploitation of this issue may allow host users with normal user privileges to trigger a denial-of-service in a Windows host machine. CVEVMware Workstation Pro/Player contains an insecure library loading vulnerability via ALSA sound driver configuration files. Successful exploitation of this issue may allow unprivileged host users to escalate their privileges to root in a Linux host machine. CVEVMware vSphere Data Protection (VDP) x, x, x, and x contains a deserialization issue. Exploitation of this issue may allow a remote attacker to execute commands on the appliance. CVEVMware Workstation (x prior to ) and Horizon View Client (4.x prior to ) contain an integer-overflow vulnerability in the True Type Font parser in the hasu.com.ar On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View. CVE
Источник: [hasu.com.ar]
, Clipboard Express Pro 2.7.11 serial key or number

Software Packages in "buster"

0ad ()
Real-time strategy game of ancient warfare
0ad-data ()
Real-time strategy game of ancient warfare (data files)
0ad-data-common ()
Real-time strategy game of ancient warfare (common data files)
0install ()
cross-distribution packaging system
0install-core ()
cross-distribution packaging system (non-GUI parts)
0xffff ()
Open Free Fiasco Firmware Flasher
qt (+b1)
mathematics based puzzle game
2ping ()
Ping utility to determine directional packet loss
2to3 ()
2to3 binary using python3
2vcard ()
perl script to convert an addressbook to VCARD file format
common (ga+b1)
Common files for IBM emulators and pr
ds ()
Directory Server suite - metapackage
ds-base ()
Directory Server suite - server
ds-base-dev ()
Directory Server suite - development files
ds-base-legacy-tools ()
Legacy utilities for Directory Server
ds-base-libs ()
Directory Server suite - libraries
3dchess ()
Play chess across 3 boards!
3depict ()
visualisation and analysis for single valued point data
4digits (+b1)
guess-the-number game, aka Bulls and Cows
4g8 ()
Packet Capture and Interception for Switched Networks
4pane ()
four-pane detailed-list file manager
4store (++b3)
RDF database storage and query engine -- database daemon
4ti2 (+ds-1)
mathematical tool suite for problems on linear spaces -- tools
4ti2-doc (+ds-1)
mathematical tool suite for problems on linear spaces -- user guide
6tunnel ()
TCP proxy for non-IPv6 applications
7kaa (+dfsg-1)
Seven Kingdoms Ancient Adversaries: real-time strategy game
7kaa-data (+dfsg-1)
Seven Kingdoms Ancient Adversaries - game data
9base (+b1)
Plan 9 userland tools
9menu ()
Creates X menus from the shell
9mount (+hg)
Plan 9 filesystem (v9fs) user mount utilities
9wm ()
X11 window manager inspired by Plan 9's rio
a2jmidid (8~dfsg)
Daemon for exposing legacy ALSA MIDI in JACK MIDI systems
a2ps ()
GNU a2ps - 'Anything to PostScript' converter and pretty-printer
a52dec
virtual package provided by libadev
a52dec-dev
virtual package provided by libadev
a56 (+dfsg-9)
Motorola DSP assembler
a7xpg (dfsg)
chase action game
a7xpg-data (dfsg)
chase action game - game data
aa3d (+b2)
ASCII art stereogram generator
aac-enc () [non-free]
Fraunhofer FDK AAC Codec Library - frontend binary
aajm (+b2)
ASCII art version of jugglemaster
aalib-bin
virtual package provided by libaa-bin
aalib1
virtual package provided by libaa1
aaphoto ()
Auto Adjust Photo, automatic color correction of photos
aapt (+r)
Android Asset Packaging Tool
aapt
virtual package provided by google-android-build-tools-installer
abacas ()
close gaps in genomic alignments from short reads
abcde ()
A Better CD Encoder
abci (~gitf94ae5e-2+b33)
Tendermint's Serverside Blockchain API
abcm2ps ()
Translates ABC music description files to PostScript
abcmidi ()
converter from ABC to MIDI format and back
abe (+dfsg-3)
side-scrolling game named "Abe's Amazing Adventure"
abe-data (+dfsg-3)
side-scrolling game named "Abe's Amazing Adventure" -- data
abgate ()
LV2 noise gate plugin
abi-compliance-checker ()
tool to compare ABI compatibility of shared C/C++ library versions
abi-dumper ()
tool to dump ABI of an ELF object containing DWARF debug info
abi-monitor ()
monitor ABI of shared libraries
abi-tracker ()
visualize ABI changes of a C/C++ library
abicheck ()
binary compatibility checking tool
abigail-doc ()
ABI Generic Analysis and Instrumentation Library (documentation)
abigail-tools ()
ABI Generic Analysis and Instrumentation Library (tools)
abinit ()
package for electronic structure calculations
abinit-data ()
package for electronic structure calculations (Data files)
abinit-doc ()
package for electronic structure calculations (Documentation)
abisip-find ()
Command line utility to find hasu.com.ar compatible BTS
abiword ()
efficient, featureful word processor with collaboration
abiword-common ()
efficient, featureful word processor with collaboration -- common files
abiword-plugin-grammar ()
grammar checking plugin for AbiWord
ableton-link-dev (+dfsg-1)
synchronizes musical applications on multiple devices - development
ableton-link-utils (+dfsg-1)
synchronizes musical applications on multiple devices - cmdline utils
ableton-link-utils-gui (+dfsg-1)
synchronizes musical applications on multiple devices - GUI utils
abntex (~beta)
LaTeX class for writing documents in ABNT standard
abook (+b2)
text-based ncurses address book application
abootimg (+b2)
Tool to read/write/update android boot images
abr2gbr (+b2)
Converts PhotoShop brushes to GIMP
abs-guide ()
The Advanced Bash-Scripting Guide
abw2epub ()
AbiWord to EPUB format converter
abw2odt ()
AbiWord to OpenDocument converter
abx (~b+b1)
audio ABX testing software
abyss ()
de novo, parallel, sequence assembler for short reads
accerciser ()
interactive Python accessibility explorer for the GNOME desktop
accountsservice ()
query and manipulate user account information
accountwizard ()
wizard for KDE PIM applications account setup
acct ()
GNU Accounting utilities for process and login accounting
ace (+b11)
HTML template engine for Go (command-line tool)
ace-gperf (+dfsg-1+b12)
ACE perfect hash function generator
ace-netsvcs (+dfsg-1+b12)
ACE network service implementations
ace-of-penguins (~rc)
penguin-themed solitaire games
acedb-other (+dfsg)
retrieval of DNA or protein sequences
acedb-other-belvu (+dfsg)
transitional package for belvu
acedb-other-belvu
virtual package provided by belvu
acedb-other-dotter (+dfsg)
transitional package for dotter
acedb-other-dotter
virtual package provided by dotter
aces3 ()
Advanced Concepts in Electronic Structure III
aces3-data ()
Advanced Concepts in Electronic Structure III
acetoneiso ()
feature-rich application to mount and manage CD and DVD images
acfax (+b1)
Receive faxes using your radio and sound card
acheck ()
Check common localisation mistakes
acheck-rules ()
Basic rules for acheck
achilles ()
Artificial life and evolution simulator
ack ()
grep-like program specifically for large source trees
ack-grep
virtual package provided by ack
acl ()
access control list - utilities
acl-dev
virtual package provided by libacl1-dev
acl2 (dfsg-1+b1 [armel], dfsg-1 [amd64, arm64, armhf, i, mips, mips64el, mipsel, ppc64el, sx])
Computational Logic for Applicative Common Lisp: main binary
acl2-books (dfsg-1+b1 [armel], dfsg-1 [amd64, arm64, armhf, i, mips, mips64el, mipsel, ppc64el, sx])
Computational Logic for Applicative Common Lisp: compiled libraries
acl2-books-certs (dfsg-1)
Computational Logic for Applicative Common Lisp: library certificates
acl2-books-source (dfsg-1)
Computational Logic for Applicative Common Lisp: library sources
acl2-doc (dfsg-1)
Computational Logic for Applicative Common Lisp: documentation
acl2-emacs (dfsg-1)
Computational Logic for Applicative Common Lisp: emacs interface
acl2-infix (dfsg-1+b1 [armel], dfsg-1 [amd64, arm64, armhf, i, mips, mips64el, mipsel, ppc64el, sx])
Computational Logic for Applicative Common Lisp: infix interface
acl2-infix-source (dfsg-1)
Computational Logic for Applicative Common Lisp: infix source
acl2-source (dfsg-1)
Computational Logic for Applicative Common Lisp: source files
hasu.com.ar (+b1)
Analog dockapp clock for GNUstep
acm ()
Multi-player classic aerial combat simulation
acme ()
Multi-platform cross assembler for // CPU
acme-tiny (+deb10u1)
letsencrypt tiny Python client
acmetool (+b11)
automatic certificate acquisition tool for Let's Encrypt
aconnectgui (rc)
graphical ALSA sequencer connection manager
acorn-fdisk ()
partition editor for Acorn/RISC OS machines
acoustid-fingerprinter (+b1)
Acoustid fingerprinter
acpi ()
displays information on ACPI devices
acpi-call
virtual package provided by acpi-call-dkms
acpi-call-dkms ()
Kernel module that enables you to call ACPI methods
acpi-fakekey (+b1)
tool to generate fake key events
acpi-modules
virtual package provided by acpi-modulesdi, acpi-modulesamddi, acpi-modulesdi, acpi-modulespae-di, acpi-modulespae-di, acpi-modulesamddi
acpi-modulesdi ()
ACPI support modules
acpi-modulespae-di ()
ACPI support modules
acpi-modulesamddi ()
ACPI support modules
acpi-modulesdi (+deb10u1)
ACPI support modules
acpi-modulespae-di (+deb10u1)
ACPI support modules
acpi-modulesamddi (+deb10u1)
ACPI support modules
acpi-support ()
scripts for handling many ACPI events
acpi-support-base ()
scripts for handling base ACPI events such as the power button
acpica-tools ()
ACPICA tools for the development and debug of ACPI tables
acpid ()
Advanced Configuration and Power Interface event daemon
acpidump
virtual package provided by acpica-tools
acpitail (+b1)
Show ACPI information in a tail-like style
acpitool (+b4)
command line ACPI client
acpitool-dbg (+b4)
command line ACPI client (debug)
acr ()
autoconf like tool
actiona ()
emulate human activity through a powerful GUI and JavaScript
actionaz ()
transitional dummy package
activemq ()
Java message broker - server
activity-log-manager ()
blacklist configuration user interface for Zeitgeist
ada-reference-manual ()
Ada language standard
ada-reference-manual ()
Ada language standard
adabrowse ()
HTML generator for Ada 95 library unit specifications
adacontrol (r)
Ada rules controller
adacontrol-doc (r)
Ada rules controller (documentation)
adapta-gtk-theme ()
Adaptive Gtk+ theme
adapta-kde ()
Port of the popular Gtk theme Adapta for Plasma 5 desktop
adapterremoval ()
rapid adapter trimming, identification, and read merging of gene sequences
adapterremoval-examples ()
rapid adapter trimming, identification, and read merging (example data)
adb (+r)
Android Debug Bridge
adcli (+b1)
Tool for performing actions on an Active Directory domain
addresses-goodies-for-gnustep (+b1)
Personal Address Manager for GNUstep (Goodies)
hasu.com.ar (+b1)
Personal Address Manager for GNUstep
adduser ()
add and remove users and groups
adequate ()
Debian package quality testing tool
adjtimex ()
kernel time variables configuration utility
adlibtracker2 ()
userfriendly tracker aimed for the OPL3 FM-chip
admesh ()
Tool for processing triangulated solid meshes. Binary
adminer ()
Web-based database administration tool
adms ()
Automatic device model synthesizer for Verilog-AMS
adns-tools (~rc)
Asynchronous-capable DNS client utilities
adonthell ()
2D graphical roleplaying game
adonthell-data ()
Data files needed by Adonthell
adplay ()
console-based OPL2 audio player
adplug-utils (+dfsg)
free AdLib sound library (utils)
adql-java ()
Parse, manipulate and translate ADQL queries with Java
adql-java-doc ()
Parse, manipulate and translate ADQL queries (API doc)
adun-core ()
Molecular Simulator
hasu.com.ar ()
Molecular Simulator for GNUstep (GUI)
advv35x-dkms ()
dkms driver sources for Advantech PCI/PCIe ACOM Series adapters
advancecomp ()
collection of recompression utilities
adventure
virtual package provided by colossal-cave-adventure, bsdgames
advi ()
active DVI previewer and presenter
advi-examples ()
example presentations for Active-DVI (advi)
adwaita-icon-theme ()
default icon theme of GNOME
adwaita-qt ()
Qt 5 port of GNOME’s Adwaita theme
aegean (+dfsg-1)
integrated genome analysis toolkit
aegisub (+dfsg-4+deb10u1)
advanced subtitle editor
aegisub-l10n (+dfsg-4+deb10u1)
aegisub language packages
aeolus ()
Synthesised pipe organ emulator
aephea ()
text-based authoring tool for HTML
aeswy (+b2)
userspace software for usb aes fingerprint scanner
aesfix ()
tool for correcting bit errors in an AES key schedule
aeskeyfind ()
tool for locating AES keys in a captured memory image
aeskulap (beta2+gite)
medical image viewer and DICOM network client
aeson-pretty (+b2 [armel], +b1 [amd64, arm64, armhf, i, mips, mips64el, mipsel, ppc64el, sx])
JSON pretty-printing tool
aespipe (d-1+b1)
AES-encryption tool with loop-AES support
aevol (+b1)
digital genetics model to run Evolution Experiments in silico
aewan (+b2 [mips64el], +b1 [amd64, arm64, armel, armhf, i, mips, mipsel, ppc64el, sx])
ASCII-art Editor Without A Name
aewm ()
minimalist window manager for X11
aewm++ ()
minimal window manager written in C++
aewm++-goodies ()
utilities to complement a minimal window manager
afew ()
Tagging script for notmuch mail
hasu.com.ar (+b1)
Application to "stick" little notes on the desktop
afflib-tools ()
Advanced Forensics Format Library (utilities)
affs-modules
virtual package provided by affs-moduleskc-malta-di, affs-modulesloongsondi, affs-modulesocteon-di, affs-moduleskc-malta-di, affs-moduleskc-malta-di, affs-modulesocteon-di, affs-modulesloongsondi, affs-moduleskc-malta-di
affs-moduleskc-malta-di ()
Amiga filesystem support
affs-moduleskc-malta-di ()
Amiga filesystem support
affs-modulesloongsondi ()
Amiga filesystem support
affs-modulesocteon-di ()
Amiga filesystem support
affs-moduleskc-malta-di (+deb10u1)
Amiga filesystem support
affs-moduleskc-malta-di (+deb10u1)
Amiga filesystem support
affs-modulesloongsondi (+deb10u1)
Amiga filesystem support
affs-modulesocteon-di (+deb10u1)
Amiga filesystem support
afio (+gitc8e) [non-free]
archive file manipulation program
afl (b-5)
instrumentation-driven fuzzer for binary formats
afl-clang (b-5)
instrumentation-driven fuzzer for binary formats - clang support
afl-cov ()
code coverage for afl (American Fuzzy Lop)
afl-doc (b-5)
instrumentation-driven fuzzer for binary formats - documentation
afnix ()
Compiler and run-time for the AFNIX programming language
afnix-doc ()
Compiler and run-time for the AFNIX programming language (documentation)
aft ()
"free form" document preparation system
afterstep ()
window manager with the NEXTSTEP look and feel
afterstep-data ()
data files for AfterStep window manager
afuse (+b3)
automounting file system implemented in user-space using FUSE
agda ()
dependently typed functional programming language
agda-bin (+b1)
commandline interface to Agda
agda-mode ()
transitional dummy package for elpa-agda2-mode
agda-mode
virtual package provided by elpa-agda2-mode
agda-stdlib ()
standard library for Agda
agda-stdlib-doc ()
standard library for Agda — documentation
agedu (+b1)
Unix utility for tracking down wasted disk space
hasu.com.ar (+b1)
Calendar manager for GNUstep
agent-transfer ()
copy a secret key from GnuPG's gpg-agent to OpenSSH's ssh-agent
aggregate (+b1)
ipv4 cidr prefix aggregator
aghermann ()
Sleep-research experiment manager
aglfn ()
Adobe Glyph List For New Fonts
agrep () [non-free]
text search tool with support for approximate patterns
agtl ()
Tool for paperless geocaching
aha ()
ANSI color to HTML converter
ahcpd (+b1)
Ad-Hoc Configuration Protocol
aho-corasick ()
Fast multiple substring searching with finite state machines
aide ()
Advanced Intrusion Detection Environment - static binary
aide-binary
virtual package provided by aide, aide-dynamic, aide-xen
aide-common ()
Advanced Intrusion Detection Environment - Common files
aide-dynamic ()
Advanced Intrusion Detection Environment - dynamic binary
aide-xen ()
Advanced Intrusion Detection Environment - static binary for XEN
aidl (+r)
Binder generator of AIDL interfaces
aiksaurus (+dev)
This package provides an English-language thesaurus (utility)
air-quality-sensor ()
user space driver for AppliedSensor's Indoor Air Monitor
aircrack-ng ()
wireless WEP/WPA cracking utilities
airgraph-ng ()
Tool to graph txt files created by aircrack-ng
airport-utils ()
configuration and management utilities for Apple AirPort base stations
airspy ()
Tiny and efficient software defined radio receiver - utilities
airstrike (+pre6a-9)
2d dogfight game in the tradition of 'Biplanes' and 'BIP'
airstrike-common (+pre6a-9)
2d dogfight game - data files
aiscm (+b1)
Guile numerical arrays and tensor extension
aisleriot ()
GNOME solitaire card game collection
aj-snapshot ()
make snapshots of JACK connections
ajaxterm ()
Web based terminal written in Python
akonadi-backend-mysql (~deb10u1)
MySQL storage backend for Akonadi
akonadi-backend-postgresql (~deb10u1)
PostgreSQL storage backend for Akonadi
akonadi-backend-sqlite (~deb10u1)
SQLite storage backend for Akonadi
akonadi-contacts-data ()
Akonadi contacts access library - data files
akonadi-import-wizard ()
PIM data import wizard
akonadi-mime-data ()
Akonadi MIME handling library - data files
akonadi-server (~deb10u1)
Akonadi PIM storage service
akonadiconsole ()
management and debugging console for akonadi
akqml (+dfsg-2)
full featured webcam capture application - qml module
akregator ()
RSS/Atom feed aggregator
alacarte ()
easy GNOME menu editing tool
aladin (+dfsg-1)
Interactive sky atlas for astronomical images and datasets
albatross-gtk-theme ()
dark and light GTK+ theme from the Shimmer Project
album () [non-free]
HTML photo album generator with theme support
aldo (+b4)
Morse code training program
ale ()
synthetic capture engine and renderer
alembic ()
lightweight database migration tool for SQLAlchemy
alevt (+b2)
X11 Teletext/Videotext browser
alevt
virtual package provided by dvb-apps
alex (+b1 [armel], [amd64, arm64, armhf, i, mips, mips64el, mipsel, ppc64el, sx])
lexical analyser generator for Haskell
alex4 ()
Alex the Allegator 4 - a retro platform game
alex4-data ()
Alex the Allegator 4 - game data
alfa (+b1)
Automated Line Fitting Algorithm
alfred ()
Almighty Lightweight Fact Remote Exchange Daemon
algobox (+dfsg-2)
algorithmics introduction - French UI
algol68g ()
Implementation of Algol 68 as defined by the Revised Report
alice ()
Web browser (WebKit or Gecko) based IRC client
alien ()
convert and install rpm and other packages
alien-arena (+dfsg-5) [contrib]
Standalone 3D first person online deathmatch shooter
alien-arena-data () [non-free]
Game data files for Alien Arena
alien-arena-server (+dfsg-5) [contrib]
Dedicated server for Alien Arena
alien-hunter ()
Interpolated Variable Order Motifs to identify horizontally acquired DNA
alienblaster ()
Classic 2D shoot 'em up
alienblaster-data ()
Game data for Alien Blaster
aliki (+b1 [mips64el], [amd64, arm64, armel, armhf, i, mips, mipsel, ppc64el, sx])
Measurement tool for Impulse Responses
all-knowing-dns ()
tiny DNS server for IPv6 Reverse DNS
allegro4-doc ()
documentation for the Allegro library
allegro5-doc ()
documentation for the Allegro 5 library
alliance ()
VLSI CAD Tools
alljoyn-daemon (b+dfsg)
AllJoyn daemon service
alljoyn-daemon (a+dfsg)
AllJoyn daemon service
alljoyn-daemon (a+dfsg)
AllJoyn daemon service
alljoyn-gateway (~git)
AllJoyn gateway agent for
alljoyn-services ()
AllJoyn base services for
alljoyn-services ()
AllJoyn base services for
alljoyn-services ()
AllJoyn base services for
alljoyn-thin-client (b-3)
AllJoyn thin client for
alljoyn-thin-client (a-3)
AllJoyn thin client for
alljoyn-thin-client ()
AllJoyn thin client for
allure (+b1 [armel], [amd64, arm64, armhf, i, mips, mips64el, mipsel, ppc64el, sx])
near-future Sci-Fi roguelike and tactical squad game
almanah (+b1)
Application to ease management of a personal diary
alot (+deb10u1)
Text mode MUA using notmuch mail
alot-doc (+deb10u1)
Text mode MUA using notmuch mail - documentation
alpine (+dfsg)
Text-based email client, friendly for novices but powerful
alpine-doc (+dfsg)
Text-based email client's documentation
alpine-pico (+dfsg)
Simple text editor from Alpine, a text-based email client
alqalam ()
Qur'an typesetting macros for TeX/LaTeX
alsa-firmware-loaders () [contrib]
ALSA software loaders for specific hardware
alsa-oss ()
ALSA wrapper for OSS applications
alsa-tools ()
Console based ALSA utilities for specific hardware
alsa-tools-gui ()
GUI based ALSA utilities for specific hardware
alsa-utils ()
Utilities for configuring and using ALSA
alsa-utils-udeb ()
Utilities for configuring and using ALSA (udeb)
alsamixergui (rc)
graphical soundcard mixer for ALSA soundcard driver
alsaplayer
virtual package provided by alsaplayer-common
alsaplayer-alsa ()
alsaplayer output module for ALSA
alsaplayer-common ()
audio player (common files)
alsaplayer-daemon ()
alsaplayer daemon
alsaplayer-gtk ()
alsaplayer gtk interface
alsaplayer-interface
virtual package provided by alsaplayer-text, alsaplayer-xosd, alsaplayer-daemon, alsaplayer-gtk
alsaplayer-jack ()
alsaplayer output module for JACK
alsaplayer-nas ()
alsaplayer output module for NAS
alsaplayer-oss ()
alsaplayer output module for OSS
alsaplayer-output
virtual package provided by alsaplayer-oss, alsaplayer-jack, alsaplayer-alsa, alsaplayer-nas
alsaplayer-text ()
alsaplayer text interface
alsaplayer-xosd ()
alsaplayer XOSD display module
alsoft-conf ()
OpenAL-Soft configuration utility
alt-ergo ()
Automatic theorem prover dedicated to program verification
alter-sequence-alignment ()
genomic sequences ALignment Transformation EnviRonment
altermime (+b1 [mips64el], [amd64, arm64, armel, armhf, i, mips, mipsel, ppc64el, sx])
utility used to alter mime-encoded mailpacks
altos ()
Altus Metrum firmware and utilities
altree (+b1)
program to perform phylogeny-based association and localization analysis
altree-examples ()
example files for ALTree
alttab ()
task switcher for minimalistic WMs or standalone X session
alure-doc ()
AL Utilities REtooled (documentation)
alure-utils (+b1)
AL Utilities REtooled (utilities)
amanda-client (+b2)
Advanced Maryland Automatic Network Disk Archiver (Client)
amanda-common (+b2)
Advanced Maryland Automatic Network Disk Archiver (Libs)
amanda-server (+b2)
Advanced Maryland Automatic Network Disk Archiver (Server)
amap-align (+gitfc29+dfsg-1)
Protein multiple alignment by sequence annealing
amavis
virtual package provided by amavisd-new
amavisd-milter ()
amavisd-new interface for milter-capable MTAs
amavisd-milter-dbg ()
amavisd-new interface for milter-capable MTAs - debugging symbols
amavisd-new ()
Interface between MTA and virus scanner/content filters
amavisd-new-milter
virtual package provided by amavisd-milter
amazon-ecr-credential-helper (+b10)
Amazon ECR Credential Helper for Docker
amb-plugins ()
ambisonics LADSPA plugins
ambdec ()
Ambisonic decoder for first and second order
amber (~gitcdade1c-1+b11)
Elegant HTML templating engine for Go, inspired from HAML and Jade (CLI tool)
amdmicrocode () [non-free]
Processor microcode firmware for AMD CPUs
amide (+b1)
software for Medical Imaging
amideco (e+b2)
Decompress flashfiles equipped with an AMI BIOS
amiga-fdisk-cross (+b1)
Partition editor for Amiga partitions (cross version)
amispammer ()
Powerful Mail Server checker on blacklists
amiwm (pl) [non-free]
Amiga look alike window manager
amoeba () [contrib]
fast-paced, polished OpenGL demonstration by Excess
amoeba-data () [non-free]
Fast-paced, polished OpenGL demonstration by Excess (data)
amoebax (+dfsg-4)
Puyo Puyo-style puzzle game for up to two players
amoebax-data (+dfsg-4)
Data files for amoebax
amora-applet (~svn+git+b2)
use a bluetooth device as X remote control (systray applet)
amora-cli (~svn+git+b2)
use a bluetooth device as X remote control (commandline tool)
amora-server
virtual package provided by amora-applet, amora-cli
amphetamine ()
jump'n run game with unique visual effects
amphetamine-data ()
data files for the game "Amphetamine"
ample ()
simple MP3 server easy to use
ampliconnoise ()
removal of noise from sequenced PCR amplicons
ampr-ripd ()
Routing daemon for AMPRnet gateway announcements
amqp-specs (r)
specs for the Advanced Message Queuing Protocol (AMQP)
amqp-tools ()
Command-line utilities for interacting with AMQP servers
ams (+b1)
Realtime modular synthesizer for ALSA
amsynth ()
two oscillator software synthesizer
amtterm ()
Serial-over-lan (sol) client for Intel AMT, console version
amule ()
client for the eD2k and Kad networks, like eMule
amule-common ()
common files for the rest of aMule packages
amule-daemon ()
non-graphic version of aMule, a client for the eD2k and Kad networks
amule-emc ()
lists ed2k links inside emulecollection files
amule-gnome-support ()
ed2k links handling support for GNOME web browsers
amule-utils ()
utilities for aMule (command-line version)
amule-utils-gui ()
graphic utilities for aMule
an ()
very fast anagram generator
anacron ()
cron-like program that doesn't go by time
anacron
virtual package provided by systemd-cron
analitza-common ()
common files for Analitza
analog ()
web server log analyzer
anarchism ()
Exhaustive exploration of Anarchist theory and practice
anbox (~git) [contrib]
Android in a box
and (+b2)
Auto Nice Daemon
andi ()
Efficient Estimation of Evolutionary Distances
androguard ()
full Python tool to play with Android files
android-androresolvd (+b1)
Daemon to transfer Android DNS property to hasu.com.ar
android-framework-res (+r)
Android platform framework resources
android-libaapt (+r)
Android Asset Packaging Tool - Shared library
android-libadb (+r)
Library for Android Debug Bridge
android-libadb-dev (+r)
Library for Android Debug Bridge - Development files
android-libandroidfw (+r)
Android utility library
android-libandroidfw-dev (+r)
Android utility library - Development files
android-libart (+r)
Android Runtime
android-libbacktrace (+r)
Android backtrace library
android-libbacktrace-dev (+r)
Android backtrace library - Development files
android-libbase (+r)
Android base library
android-libbase-dev (+r)
Android base library - Development files
android-libboringssl (+r)
Google's internal fork of OpenSSL for the Android SDK
android-libboringssl-dev (+r)
Google's internal fork of OpenSSL for the Android SDK - devel
android-libcrypto-utils (+r)
Android crypto-utils library
android-libcrypto-utils-dev (+r)
Android crypto-utils library - Development files
android-libcutils (+r)
Android utils library for C
android-libcutils-dev (+r)
Android utils library for C - Development files
android-libetc1 (+r)
ETC1 compression library
android-libetc1-dev (+r)
ETC1 compression library - Development files
android-libext4-utils (+r)
Android ext4 utility library
android-libext4-utils-dev (+r)
Android ext4 utility library - Development files
android-libf2fs-utils (+r)
Android F2FS utility library
android-libf2fs-utils-dev (+r)
Android F2FS utility library - Development files
android-liblog (+r)
Android NDK logger interfaces
android-liblog-dev (+r)
Android NDK logger interfaces - Development files
android-libnativebridge (+r)
Android native bridge library
android-libnativebridge-dev (+r)
Android native bridge library - Development files
android-libnativehelper (+r)
Support functions for Android's class libraries
android-libnativehelper-dev (+r)
Support functions for Android's class libraries - Development files
android-libnativeloader (+r)
Android native loader library
android-libnativeloader-dev (+r)
Android native loader library - Development files
android-libselinux (+r)
Security-Enhanced Linux for Android
android-libselinux-dev (+r)
Security-Enhanced Linux for Android - Development files
android-libsepol (+r)
Security-Policy Linux for Android
android-libsepol-dev (+r)
Security-Policy Linux for Android - Development files
android-libsparse (+r)
Library for sparse files
android-libsparse-dev (+r)
Library for sparse files - Development files
android-libunwind (+r)
libunwind for Android
android-libunwind-dev (+r)
libunwind for Android - Development files
android-libutils (+r)
Android Utility Function Library
android-libutils-dev (+r)
Android Utility Function Library - Development files
android-libziparchive (+r)
Library for ZIP archives
android-libziparchive-dev (+r)
Library for ZIP archives - Development files
android-logtags-tools (+r)
Tools from AOSP that process event-log-tags files
android-platform-frameworks-native-headers (+r)
Headers of android-platform-frameworks-native
android-platform-libcore-headers (+r)
Header files in AOSP repository platform/libcore
android-platform-system-core-headers (+r)
Shared headers in AOSP repository platform/system/core
android-sdk (+11+deb10u1)
Software development kit for Android platform
android-sdk-build-tools (+11+deb10u1)
Tools for building Android applications
android-sdk-build-tools-common (+11+deb10u1)
Tools for building Android applications - Common files
android-sdk-common (+11+deb10u1)
Common files of Android SDK base toolset
android-sdk-ext4-utils (+r)
Android ext4-utils tools
android-sdk-libsparse-utils (+r)
Android sparse image creation tool
android-sdk-platform (+r)
Android SDK Platform for API Level 23 ( Marshmallow)
android-sdk-platform-tools (+11+deb10u1)
Tools for interacting with an Android platform
android-sdk-platform-tools-common (+11+deb10u1)
Tools for interacting with an Android platform - Common files
android-system-dev
virtual package provided by android-platform-system-core-headers
android-tools-adb (+r)
transitional package
android-tools-adb
virtual package provided by adb
android-tools-adbd (r)
Android Debug Bridge daemon
android-tools-fastboot (+r)
transitional package
android-tools-fastboot
virtual package provided by fastboot
android-tools-fsutils (r)
Android ext4 utilities with sparse support
android-tools-mkbootimg (+r)
transitional package
anfo ()
Short Read Aligner/Mapper from MPG
angband ()
Single-player, text-based, dungeon simulation game
angband-data ()
Game data for angband
angrydd ()
Angry Drunken Dwarves - falling blocks puzzle game
animals ()
Traditional AI animal guessing engine using a binary tree DB
anjuta ()
GNOME development IDE, for C/C++
anjuta-common ()
GNOME development IDE, for C/C++ - data files
anjuta-extras ()
plugins and extras for anjuta
anki (+dfsg-1)
extensible flashcard learning program
ann-tools (+doc-7)
Approximate Nearest Neighbor Searching library (tools)
anna ()
anna's not nearly apt, but for the Debian installer, it will do
anomaly (+b1)
detect anomalous data in a numeric stream
anope (+b1)
IRC Services designed for flexibility and ease of use
anorack ()
specialized spell-checker that finds incorrect indefinite articles
ansible (+dfsg-1)
Configuration management, deployment, and task execution system
ansible-doc (+dfsg-1)
Ansible documentation and examples
ansible-lint (+dfsg)
lint tool for Ansible playbooks
ansible-tower-cli ()
command line tool for Ansible Tower and AWX Project
ansible-tower-cli-doc ()
documentation for tower-cli command line tool and library
ansiweather ()
Weather in your terminal, with ANSI colors and Unicode symbols
ant ()
Java based build tool like make
ant-contrib (~b3+svn)
collection of tasks, types and other tools for Apache Ant
ant-contrib-cpptasks (~b)
C/C++ compilation tasks for Ant.
ant-doc ()
Java based build tool like make - API documentation and manual
ant-optional ()
Java based build tool like make - optional libraries
antennavis (+b1)
antenna radiation pattern visualization software
anthy ()
Japanese kana-kanji conversion - utilities
anthy-common ()
Japanese kana-kanji conversion - dictionary
anthy-el ()
Japanese kana-kanji conversion - elisp frontend
antigravitaattori ()
Multiplayer flying saucer racing game
antimony (+b1 [amd64, arm64, armel, armhf, i, mips, ppc64el, sx], [mips64el, mipsel])
Computer-aided design CAD tool
antiword ()
Converts MS Word files to text, PS, PDF and XML
antlr (+dfsg)
language tool for constructing recognizers, compilers etc
antlr-doc (+dfsg)
language tool for constructing recognizers, compilers etc
antlr3 ()
language tool for constructing recognizers, compilers etc
antlr3-doc ()
language tool for constructing compilers etc - documentation
antlr3-gunit-maven-plugin ()
Maven plugin for gUnit, a unit test framework for ANTLR grammars
antlr3-maven-plugin ()
Maven plugin for ANTLR 3
antlr ()
language tool for constructing recognizers, compilers etc
antlrgunit-maven-plugin ()
Maven plugin for gUnit, a unit test framework for ANTLR grammars
antlrmaven-plugin ()
Maven plugin for ANTLR
antlr4 ()
ANTLR Parser Generator
antlr4-doc ()
ANTLR Parser Generator (documentation)
antlr4-maven-plugin ()
Maven plugin for ANTLR 4
antpm ()
ANT+ information retrieval client for Garmin GPS products
anypaper (+b1)
front-end for wallpapersetter
anyremote ()
Remote control daemon for applications using Bluetooth, IrDA or WiFi
anyremote-data ()
architecture independent files for anyremote
anyremote-doc ()
Documentation for anyremote
anytun ()
secure anycast tunneling protocol
aodh-api ()
OpenStack Telemetry (Ceilometer) Alarming - API server
aodh-common ()
OpenStack Telemetry (Ceilometer) Alarming - common files
aodh-doc ()
OpenStack Telemetry (Ceilometer) Alarming - doc
aodh-evaluator ()
OpenStack Telemetry (Ceilometer) Alarming - alarm evaluator
aodh-expirer ()
OpenStack Telemetry (Ceilometer) Alarming - expirer
aodh-listener ()
OpenStack Telemetry (Ceilometer) Alarming - listener
aodh-notifier ()
OpenStack Telemetry (Ceilometer) Alarming - alarm notifier
aoetools ()
tools to assist in using ATA over Ethernet
aoeui (+git4e5dee)
lightweight, unobtrusive, Dvorak-optimized text editor
aoflagger (+b2)
Find RFI in radio astronomical observations
aoflagger-dev (+b2)
Find RFI in radio astronomical observations (development files)
aom-tools ()
AV1 Video Codec Library -- Tools
aosd-cat (+b1)
an on screen display tool which uses libaosd
ap-utils (+b1)
Access Point SNMP Utils for Linux
apache-tools
virtual package provided by open-infrastructure-apache-tools
apache2 (+deb10u4) [security]
Apache HTTP Server
apache2-api
virtual package provided by apache2-bin
apache2-apiopenssl
virtual package provided by apache2-bin
apache2-bin (+deb10u4) [security]
Apache HTTP Server (modules and other binary files)
apache2-data (+deb10u4) [security]
Apache HTTP Server (common files)
apache2-dev (+deb10u4) [security]
Apache HTTP Server (development headers)
apache2-doc (+deb10u4) [security]
Apache HTTP Server (on-site documentation)
apache2-ssl-dev (+deb10u4) [security]
Apache HTTP Server (mod_ssl development headers)
apache2-suexec
virtual package provided by apache2-suexec-pristine, apache2-suexec-custom
apache2-suexec-custom (+deb10u4) [security]
Apache HTTP Server configurable suexec program for mod_suexec
apache2-suexec-pristine (+deb10u4) [security]
Apache HTTP Server standard suexec program for mod_suexec
apache2-utils (+deb10u4) [security]
Apache HTTP Server (utility programs for web servers)
apachedex ()
Compute APDEX from Apache-style logs
apacheds (~M)
Apache Directory Server
apachetop ()
Realtime Apache monitoring tool
apbs (+b1)
Adaptive Poisson Boltzmann Solver
apcalc ()
Arbitrary precision calculator (original name: calc)
apcalc-common ()
Arbitrary precision calculator (common files)
apcalc-dev ()
Library for arbitrary precision arithmetic
apcupsd ()
APC UPS Power Management (daemon)
apcupsd-cgi ()
APC UPS Power Management (web interface)
apcupsd-doc ()
APC UPS Power Management (documentation/examples)
apel (+)
portable library for emacsen
apertium ()
Shallow-transfer machine translation engine
apertium-af-nl (~r)
Apertium translation data for the Afrikaans-Dutch pair
apertium-all-dev ()
Metapackage for all tools required for Apertium development
apertium-apy ()
Apertium APY service
apertium-ar-mt
virtual package provided by apertium-mlt-ara
apertium-ara-mlt
virtual package provided by apertium-mlt-ara
apertium-arg (~r)
Apertium single language data for Aragonese
apertium-arg-cat (~r)
Apertium translation data for the Aragonese-Catalan pair
apertium-arg-spa
virtual package provided by apertium-spa-arg
apertium-ast-es
virtual package provided by apertium-es-ast
apertium-bel (~r)
Apertium single language data for Belarusian
apertium-bel-rus (~r)
Apertium translation data for the Belarusian-Russian pair
apertium-bg-mk
virtual package provided by apertium-mk-bg
apertium-br-fr (~r)
Apertium linguistic data to translate between Breton and French
apertium-ca-en
virtual package provided by apertium-en-ca
apertium-ca-eo
virtual package provided by apertium-eo-ca
apertium-ca-es
virtual package provided by apertium-es-ca
apertium-ca-fr
virtual package provided by apertium-fra-cat
apertium-ca-it (~r)
Apertium translation data for the Catalan-Italian pair
apertium-ca-oc
virtual package provided by apertium-oc-ca
apertium-ca-pt
virtual package provided by apertium-pt-ca
apertium-cat ()
Apertium single language data for Catalan
apertium-cat-arg
virtual package provided by apertium-arg-cat
apertium-cat-fra
virtual package provided by apertium-fra-cat
apertium-cat-spa
virtual package provided by apertium-spa-cat
apertium-cat-srd (~r)
Apertium translation data for the Catalan-Sardinian pair
apertium-crh (~r)
Apertium single language data for Crimean Tatar
apertium-crh-tur (~r)
Apertium translation data for the Crimean Tatar-Turkish pair
apertium-cy-en (~r)
Apertium translation data for the Welsh-English pair
apertium-da-sv
virtual package provided by apertium-swe-dan
apertium-dan (~r)
Apertium single language data for Danish
apertium-dan-nor (~r)
Apertium translation data for the Danish-Norwegian pair
apertium-dan-swe
virtual package provided by apertium-swe-dan
apertium-dev ()
Development tools and library for Apertium
apertium-en-ca (~r)
Apertium translation data for the English-Catalan pair
apertium-en-cy
virtual package provided by apertium-cy-en
apertium-en-eo
virtual package provided by apertium-eo-en
apertium-en-es (~r)
Apertium translation data for the English-Spanish pair
apertium-en-eu
virtual package provided by apertium-eu-en
apertium-en-gl (~r)
Apertium translation data for the English-Galician pair
apertium-en-mk
virtual package provided by apertium-mk-en
apertium-eng-hbs
virtual package provided by apertium-hbs-eng
apertium-eng-isl
virtual package provided by apertium-isl-eng
apertium-eo-ca (~r)
Apertium translation data for the Esperanto-Catalan pair
apertium-eo-en (~r)
Apertium linguistic data to translate between Esperanto and English
apertium-eo-es (~r)
Apertium translation data for the Esperanto-Spanish pair
apertium-eo-fr (~r)
Apertium translation data for the Esperanto-French pair
apertium-es-ast (~r)
Apertium translation data for the Spanish-Asturian pair
apertium-es-ca (~r)
Transitional dummy package for apertium-spa-cat
apertium-es-en
virtual package provided by apertium-en-es
apertium-es-eo
virtual package provided by apertium-eo-es
apertium-es-eu
virtual package provided by apertium-eu-es
apertium-es-fr
virtual package provided by apertium-fr-es
apertium-es-gl (~r)
Apertium translation data for the Spanish-Galician pair
apertium-es-it (~r)
Transitional dummy package for apertium-spa-ita
apertium-es-oc
virtual package provided by apertium-oc-es
apertium-es-pt (+svn~)
Apertium translation data for the Spanish-Portuguese pair
apertium-es-ro (~r)
Apertium translation data for the Spanish-Romanian pair
apertium-eu-en (~r)
Apertium translation data for the Basque-English pair
apertium-eu-es (~r)
Apertium translation data for the Basque-Spanish pair
apertium-fr-br
virtual package provided by apertium-br-fr
apertium-fr-ca
virtual package provided by apertium-fra-cat
apertium-fr-eo
virtual package provided by apertium-eo-fr
apertium-fr-es (~r)
Apertium translation data for the French-Spanish pair
apertium-fra ()
Apertium single language data for French
apertium-fra-cat ()
Apertium translation data for the French-Catalan pair
apertium-gl-en
virtual package provided by apertium-en-gl
apertium-gl-es
virtual package provided by apertium-es-gl
apertium-gl-pt
virtual package provided by apertium-pt-gl
apertium-hbs (~r)
Apertium single language data for Serbo-Croatian
apertium-hbs-eng (~r)
Apertium translation data for the Serbo-Croatian - English pair
apertium-hbs-mkd (~r)
Apertium translation data for the Serbo-Croatian-Macedonian pair
apertium-hbs-slv (~r)
Apertium translation data for the Serbo-Croatian-Slovenian pair
apertium-hin (~r)
Apertium single language data for Hindi
apertium-hin-urd
virtual package provided by apertium-urd-hin
apertium-id-ms (~r)
Apertium translation data for the Indonesian-Malay pair
apertium-is-sv (~r)
Apertium translation data for the Icelandic-Swedish pair
apertium-isl (~r)
Apertium single language data for Icelandic
apertium-isl-eng (~r)
Apertium translation data for the Icelandic-English pair
apertium-it-ca
virtual package provided by apertium-ca-it
apertium-it-es
virtual package provided by apertium-es-it
apertium-ita (~r)
Apertium single language data for Italian
apertium-ita-spa
virtual package provided by apertium-spa-ita
apertium-ita-srd
virtual package provided by apertium-srd-ita
apertium-kaz (~r)
Apertium single language data for Kazakh
apertium-kaz-tat (~r)
Apertium translation data for the Kazakh-Tatar pair
apertium-lex-tools ()
Constraint-based lexical selection module
apertium-mk-bg (~r)
Apertium translation data for the Macedonian-Bulgarian pair
apertium-mk-en (~r)
Apertium translation data for the Macedonian-English pair
apertium-mkd-hbs
virtual package provided by apertium-hbs-mkd
apertium-mlt-ara (~r)
Apertium translation data for the Maltese-Arabic pair
apertium-ms-id
virtual package provided by apertium-id-ms
apertium-mt-ar
virtual package provided by apertium-mlt-ara
apertium-nl-af
virtual package provided by apertium-af-nl
apertium-nno (~r)
Apertium single language data for Norwegian Nynorsk
apertium-nno-nob (~r)
Apertium translation data for the Norwegian Nynorsk-Norwegian Bokmål pair
apertium-nob (~r)
Apertium single language data for Norwegian Bokmål
apertium-nob-nno
virtual package provided by apertium-nno-nob
apertium-nob-sme
virtual package provided by apertium-sme-nob
apertium-nor-dan
virtual package provided by apertium-dan-nor
apertium-nor-swe
virtual package provided by apertium-swe-nor
apertium-oc-ca (~r)
Apertium translation data for the Occitan-Catalan pair
apertium-oc-es (~r)
Apertium translation data for the Occitan-Spanish pair
apertium-oci ()
Apertium single language data for Occitan
apertium-pol ()
Apertium single language data for Polish
apertium-pt-ca (+svn~)
Apertium translation data for the Portuguese-Catalan pair
apertium-pt-es
virtual package provided by apertium-es-pt
apertium-pt-gl (~r)
Apertium translation data for the Portuguese-Galician pair
apertium-ro-es
virtual package provided by apertium-es-ro
apertium-rus (~r)
Apertium single language data for Russian
apertium-rus-bel
virtual package provided by apertium-bel-rus
apertium-separable ()
Reordering separable/discontiguous multiwords
apertium-slv-hbs
virtual package provided by apertium-hbs-slv
apertium-sme-nob (~r)
Apertium translation data for the Northern Sami-Norwegian Bokmål pair
apertium-spa (~r)
Apertium single language data for Spanish
apertium-spa-arg (~r)
Apertium translation data for the Spanish-Aragonese pair
apertium-spa-cat (~r)
Apertium translation data for the Spanish-Catalan pair
apertium-spa-ita (~r)
Apertium translation data for the Spanish-Italian pair
apertium-srd (~r)
Apertium single language data for Sardinian
apertium-srd-cat
virtual package provided by apertium-cat-srd
apertium-srd-ita (~r)
Apertium translation data for the Sardinian-Italian pair
apertium-sv-da
virtual package provided by apertium-swe-dan
apertium-sv-is
virtual package provided by apertium-is-sv
apertium-swe (~r)
Apertium single language data for Swedish
apertium-swe-dan (~r)
Apertium translation data for the Swedish-Danish pair
apertium-swe-nor (~r)
Apertium translation data for the Swedish-Norwegian pair
apertium-szl ()
Apertium single language data for Silesian
apertium-tat (~r)
Apertium single language data for Tatar
apertium-tat-kaz
virtual package provided by apertium-kaz-tat
apertium-tur (~r)
Apertium single language data for Turkish
apertium-tur-crh
virtual package provided by apertium-crh-tur
apertium-ukr (~r)
Apertium single language data for Ukrainian
apertium-urd (~r)
Apertium single language data for Urdu
apertium-urd-hin (~r)
Apertium translation data for the Urdu-Hindi pair
apf-firewall (+rev)
easy iptables based firewall system
apg (dfsg)
Automated Password Generator - Standalone version
apgdiff (~alphagcaaaed)
Another PostgreSQL Diff Tool
api-sanity-checker ()
automatic generator of basic unit tests for a C/C++ library API
apitrace (+gitd38a69d6+repack-3+b3)
tools for debugging OpenGL applications and drivers - cli frontends
apitrace-gui (+gitd38a69d6+repack-3+b3)
tools for debugging OpenGL applications and drivers - graphical frontend
apitrace-tracers (+gitd38a69d6+repack-3+b3)
tools for debugging OpenGL applications and drivers - application tracer
apkinfo ()
Simple CLI script to display info about an APK file
apksigner ()
command line tool to sign and verify Android APKs
apktool ()
tool for reverse engineering Android apk files
aplus-fsf ()
A+ programming language run-time environment
aplus-fsf-dev ()
A+ programming language development environment
aplus-fsf-doc ()
A+ programming language documentation
aplus-fsf-el ()
XEmacs lisp for A+ development
apm-sleep
virtual package provided by sleepd
apng2gif ()
tool for converting APNG images to animated GIF format
apngasm ()
assemble APNG animation from PNG/TGA image sequence
apngdis ()
deconstruct APNG file into a sequence of PNG frames
apngopt ()
optimize APNG animated images
apophenia-bin (+ds-7+b13)
Apophenia Statistical C Library -- binary package
apophenia-doc (+ds-7)
Apophenia Statistical C Library -- reference manual
apparix ()
console-based bookmark tool for fast file system navigation
apparmor ()
user-space parser utility for AppArmor
apparmor-easyprof ()
AppArmor easyprof profiling tool
apparmor-notify ()
AppArmor notification system
apparmor-profiles ()
experimental profiles for AppArmor security policies
apparmor-profiles-extra ()
Extra profiles for AppArmor Security policies
apparmor-utils ()
utilities for controlling AppArmor
appc-spec (+dfsg-2+b11)
App Container Specification (appc) - tools
append2simg (+r)
Transitional package
apper ()
KDE package management tool using PackageKit
Источник: [hasu.com.ar]
Clipboard Express Pro 2.7.11 serial key or number

Ini filter support to detailed results view - Improved 64-bit support for Registry Cleaner - Fixed minor bug in Uninstall Tool - Fixed minor bug in System Restore Tool - Minor interface bugs fixed - Minor display bugs fixed brbrh6v2. 999 (02 Sep 2009)h6 - Improved Opera 10 support for final release - Fixed the "No Disk" exception error - Fixed ProgramFiles bug in 64-bit Registry scanning brbrh6v2.

993 (26 Aug 2009)h6 - Added Taskbar Jump List cleaning for Windows 7 - Added history cleaning support for Opera 10 - Added icons to Cookie selection to show browser - Improved scrolling in new results window - Improved Avira Anti-virus cleaning - Improved multiselect in listviews - Improved 64-bit support when includingexcluding files - Improved 64-bit issue detection in Registry screen - Updated internal icons - Added language support for Armenian - Fixed language bugs with new results window - Fixed bug in Recycle Bin cleaning - Fixed minor bug with help files in Registry Cleaner - Fixed bug when deleting an application in Uninstall Tool - Fixed bug when enablingdisabling in Startup Tool - Minor GUI improvements brbrh6v2.

968 (27 Jul 2009)h6 - Redesign of Cleaner results panel - Added support for Opera 10 Beta - Added support for Safari 4. 0 - Added search to Uninstall tool - Added search to Cookies screen - Improved User assist cleaning in Windows 7 - Fixed bug in OpenOffice cleaning - Fixed IE8 SuggestedSites.

.

What’s New in the Clipboard Express Pro 2.7.11 serial key or number?

Screen Shot

System Requirements for Clipboard Express Pro 2.7.11 serial key or number

Add a Comment

Your email address will not be published. Required fields are marked *