Show filters
176 Total Results
Displaying 21-30 of 176
Sort by:
Attacker Value
Unknown
CVE-2020-7649
Disclosure Date: July 25, 2022 (last updated October 07, 2023)
This affects the package snyk-broker before 4.73.0. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal.
0
Attacker Value
Unknown
CVE-2022-31213
Disclosure Date: July 17, 2022 (last updated October 07, 2023)
An issue was discovered in dbus-broker before 31. Multiple NULL pointer dereferences can be found when supplying a malformed XML config file.
0
Attacker Value
Unknown
CVE-2022-31212
Disclosure Date: July 17, 2022 (last updated October 07, 2023)
An issue was discovered in dbus-broker before 31. It depends on c-uitl/c-shquote to parse the DBus service's Exec line. c-shquote contains a stack-based buffer over-read if a malicious Exec line is supplied.
0
Attacker Value
Unknown
CVE-2022-1833
Disclosure Date: June 21, 2022 (last updated October 07, 2023)
A flaw was found in AMQ Broker Operator 7.9.4 installed via UI using OperatorHub where a low-privilege user that has access to the namespace where the AMQ Operator is deployed has access to clusterwide edit rights by checking the secrets. The service account used for building the Operator gives more permission than expected and an attacker could benefit from it. This requires at least an already compromised low-privilege account or insider attack.
0
Attacker Value
Unknown
CVE-2022-25647
Disclosure Date: May 01, 2022 (last updated October 07, 2023)
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
0
Attacker Value
Unknown
CVE-2021-41551
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
Leostream Connection Broker 9.0.40.17 allows administrators to conduct directory traversal attacks by uploading z ZIP file that contains a symbolic link.
0
Attacker Value
Unknown
CVE-2021-41550
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
Leostream Connection Broker 9.0.40.17 allows administrator to upload and execute Perl code.
0
Attacker Value
Unknown
CVE-2021-44832
Disclosure Date: December 28, 2021 (last updated February 23, 2025)
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
0
Attacker Value
Unknown
CVE-2021-45105
Disclosure Date: December 18, 2021 (last updated February 23, 2025)
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.
0
Attacker Value
Unknown
CVE-2021-3712
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL termi…
0