Show filters
814 Total Results
Displaying 321-330 of 814
Sort by:
Attacker Value
Unknown
CVE-2023-29403
Disclosure Date: June 08, 2023 (last updated October 08, 2023)
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.
0
Attacker Value
Unknown
CVE-2023-33959
Disclosure Date: June 06, 2023 (last updated April 02, 2024)
notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry can cause users to verify the wrong artifact. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation-go library to v1.0.0-rc.6 or above. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.
0
Attacker Value
Unknown
CVE-2023-33964
Disclosure Date: May 31, 2023 (last updated October 08, 2023)
mx-chain-go is an implementation of the MultiversX blockchain protocol written in the Go language. Metachain cannot process a cross-shard miniblock. Prior to version 1.4.16, an invalid transaction with the wrong username on metachain is not treated correctly on the metachain transaction processor. This is strictly a processing issue that could have happened on MultiversX chain. If an error like this had occurred, the metachain would have stopped notarizing blocks from the shard chains. The resuming of notarization is possible only after applying a patched binary version. A patch in version 1.4.16 introduces `processIfTxErrorCrossShard` for the metachain transaction processor. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2023-33509
Disclosure Date: May 31, 2023 (last updated October 08, 2023)
KramerAV VIA GO² < 4.0.1.1326 is vulnerable to SQL Injection.
0
Attacker Value
Unknown
CVE-2023-33508
Disclosure Date: May 31, 2023 (last updated October 08, 2023)
KramerAV VIA GO² < 4.0.1.1326 is vulnerable to unauthenticated file upload resulting in Remote Code Execution (RCE).
0
Attacker Value
Unknown
CVE-2023-33507
Disclosure Date: May 31, 2023 (last updated October 08, 2023)
KramerAV VIA GO² < 4.0.1.1326 is vulnerable to Unauthenticated arbitrary file read.
0
Attacker Value
Unknown
CVE-2023-32698
Disclosure Date: May 30, 2023 (last updated October 08, 2023)
nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged
the files (without extra config for enforcing it’s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders.
0
Attacker Value
Unknown
CVE-2023-32691
Disclosure Date: May 30, 2023 (last updated October 08, 2023)
gost (GO Simple Tunnel) is a simple tunnel written in golang. Sensitive secrets such as passwords, token and API keys should be compared only using a constant-time comparison function. Untrusted input, sourced from a HTTP header, is compared directly with a secret. Since this comparison is not secure, an attacker can mount a side-channel timing attack to guess the password. As a workaround, this can be easily fixed using a constant time comparing function such as `crypto/subtle`'s `ConstantTimeCompare`.
0
Attacker Value
Unknown
CVE-2023-2500
Disclosure Date: May 25, 2023 (last updated October 08, 2023)
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 3.3.19 via deserialization of untrusted input from the 'go_pricing' shortcode 'data' parameter. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
0
Attacker Value
Unknown
CVE-2023-2498
Disclosure Date: May 24, 2023 (last updated October 08, 2023)
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.19 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0