Show filters
814 Total Results
Displaying 311-320 of 814
Sort by:
Attacker Value
Unknown
CVE-2023-36622
Disclosure Date: July 05, 2023 (last updated October 08, 2023)
The websocket configuration endpoint of the Loxone Miniserver Go Gen.2 before 14.1.5.9 allows remote authenticated administrators to inject arbitrary OS commands via the timezone parameter.
0
Attacker Value
Unknown
CVE-2023-3515
Disclosure Date: July 05, 2023 (last updated October 08, 2023)
Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4.
0
Attacker Value
Unknown
CVE-2023-36223
Disclosure Date: July 03, 2023 (last updated October 08, 2023)
Cross Site Scripting vulnerability in mlogclub bbs-go v. 3.5.5. and before allows a remote attacker to execute arbitrary code via a crafted payload to the announcements parameter in the settings function.
0
Attacker Value
Unknown
CVE-2023-36222
Disclosure Date: July 03, 2023 (last updated October 08, 2023)
Cross Site Scripting vulnerability in mlogclub bbs-go v. 3.5.5. and before allows a remote attacker to execute arbitrary code via a crafted payload to the comment parameter in the article function.
0
Attacker Value
Unknown
CVE-2023-35947
Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Gradle is a build tool with a focus on build automation and support for multi-language development. In affected versions when unpacking Tar archives, Gradle did not check that files could be written outside of the unpack location. This could lead to important files being overwritten anywhere the Gradle process has write permissions. For a build reading Tar entries from a Tar archive, this issue could allow Gradle to disclose information from sensitive files through an arbitrary file read. To exploit this behavior, an attacker needs to either control the source of an archive already used by the build or modify the build to interact with a malicious archive. It is unlikely that this would go unnoticed. A fix has been released in Gradle 7.6.2 and 8.2 to protect against this vulnerability. Starting from these versions, Gradle will refuse to handle Tar archives which contain path traversal elements in a Tar entry name. Users are advised to upgrade. There are no known workarounds for this v…
0
Attacker Value
Unknown
CVE-2023-35946
Disclosure Date: June 30, 2023 (last updated October 08, 2023)
Gradle is a build tool with a focus on build automation and support for multi-language development. When Gradle writes a dependency into its dependency cache, it uses the dependency's coordinates to compute a file location. With specially crafted dependency coordinates, Gradle can be made to write files into an unintended location. The file may be written outside the dependency cache or over another file in the dependency cache. This vulnerability could be used to poison the dependency cache or overwrite important files elsewhere on the filesystem where the Gradle process has write permissions. Exploiting this vulnerability requires an attacker to have control over a dependency repository used by the Gradle build or have the ability to modify the build's configuration. It is unlikely that this would go unnoticed. A fix has been released in Gradle 7.6.2 and 8.2 to protect against this vulnerability. Gradle will refuse to cache dependencies that have path traversal elements in their dep…
0
Attacker Value
Unknown
CVE-2023-34800
Disclosure Date: June 15, 2023 (last updated October 08, 2023)
D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at genacgi_main.
0
Attacker Value
Unknown
CVE-2023-30082
Disclosure Date: June 14, 2023 (last updated October 08, 2023)
A denial of service attack might be launched against the server if an unusually lengthy password (more than 10000000 characters) is supplied using the osTicket application. This can cause the website to go down or stop responding. When a long password is entered, this procedure will consume all available CPU and memory.
0
Attacker Value
Unknown
CVE-2023-29405
Disclosure Date: June 08, 2023 (last updated October 08, 2023)
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.
0
Attacker Value
Unknown
CVE-2023-29404
Disclosure Date: June 08, 2023 (last updated October 08, 2023)
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
0