Show filters
67 Total Results
Displaying 21-30 of 67
Sort by:
Attacker Value
Unknown

CVE-2018-3759

Disclosure Date: June 13, 2018 (last updated November 26, 2024)
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.
0
Attacker Value
Unknown

CVE-2018-0516

Disclosure Date: February 16, 2018 (last updated November 26, 2024)
Untrusted search path vulnerability in FLET'S v4 / v6 address selection tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
0
Attacker Value
Unknown

CVE-2017-0909

Disclosure Date: November 16, 2017 (last updated November 26, 2024)
The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery.
0
Attacker Value
Unknown

CVE-2017-0904

Disclosure Date: November 13, 2017 (last updated November 26, 2024)
The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery.
0
Attacker Value
Unknown

CVE-2015-7686

Disclosure Date: October 06, 2015 (last updated October 05, 2023)
Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.
0
Attacker Value
Unknown

CVE-2014-9566

Disclosure Date: March 10, 2015 (last updated October 05, 2023)
Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP & Network Quality Manager (VNQM) before 4.2, Server & Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint.
0
Attacker Value
Unknown

CVE-2014-6239

Disclosure Date: September 11, 2014 (last updated October 05, 2023)
SQL injection vulnerability in the Address visualization with Google Maps (st_address_map) extension before 0.3.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
0
Attacker Value
Unknown

CVE-2014-1474

Disclosure Date: July 15, 2014 (last updated October 05, 2023)
Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address.
0
Attacker Value
Unknown

CVE-2014-4720

Disclosure Date: July 06, 2014 (last updated October 05, 2023)
Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.
0
Attacker Value
Unknown

CVE-2014-0477

Disclosure Date: July 03, 2014 (last updated October 05, 2023)
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
0