Show filters
815 Total Results
Displaying 471-480 of 815
Sort by:
Attacker Value
Unknown
CVE-2022-29183
Disclosure Date: May 20, 2022 (last updated October 07, 2023)
GoCD is a continuous delivery server. GoCD versions 20.2.0 until 21.4.0 are vulnerable to reflected cross-site scripting via abuse of the pipeline comparison function's error handling to render arbitrary HTML into the returned page. This could allow an attacker to trick a victim into executing code which would allow the attacker to operate on, or gain control over the same resources as the victim had access to. This issue is fixed in GoCD 21.4.0. As a workaround, block access to `/go/compare/.*` prior to GoCD Server via a reverse proxy, web application firewall or equivalent, which would prevent use of the pipeline comparison function.
0
Attacker Value
Unknown
CVE-2022-29177
Disclosure Date: May 20, 2022 (last updated October 07, 2023)
Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack.
0
Attacker Value
Unknown
CVE-2022-28948
Disclosure Date: May 19, 2022 (last updated November 29, 2024)
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
0
Attacker Value
Unknown
CVE-2021-41545
Disclosure Date: May 10, 2022 (last updated October 07, 2023)
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). When the controller receives a specific BACnet protocol packet, an exception causes the BACnet communication function to go into a “out of work” state and could result in the controller going into a “factory reset” state.
0
Attacker Value
Unknown
CVE-2022-29173
Disclosure Date: May 05, 2022 (last updated October 07, 2023)
go-tuf is a Go implementation of The Update Framework (TUF). go-tuf does not correctly implement the client workflow for updating the metadata files for roles other than the root role. Specifically, checks for rollback attacks are not implemented correctly meaning an attacker can cause clients to install software that is older than the software which the client previously knew to be available, and may include software with known vulnerabilities. In more detail, the client code of go-tuf has several issues in regards to preventing rollback attacks: 1. It does not take into account the content of any previously trusted metadata, if available, before proceeding with updating roles other than the root role (i.e., steps 5.4.3.1 and 5.5.5 of the detailed client workflow). This means that any form of version verification done on the newly-downloaded metadata is made using the default value of zero, which always passes. 2. For both timestamp and snapshot roles, go-tuf saves these metadata fil…
0
Attacker Value
Unknown
CVE-2022-29810
Disclosure Date: April 27, 2022 (last updated October 07, 2023)
The Hashicorp go-getter library before 1.5.11 does not redact an SSH key from a URL query parameter.
0
Attacker Value
Unknown
CVE-2022-29583
Disclosure Date: April 22, 2022 (last updated November 08, 2023)
service_windows.go in the kardianos service package for Go omits quoting that is sometimes needed for execution of a Windows service executable from the intended directory. NOTE: this finding could not be reproduced by its original reporter or by others.
0
Attacker Value
Unknown
CVE-2022-28327
Disclosure Date: April 20, 2022 (last updated October 07, 2023)
The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.
0
Attacker Value
Unknown
CVE-2022-24675
Disclosure Date: April 20, 2022 (last updated October 07, 2023)
encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.
0
Attacker Value
Unknown
CVE-2022-27536
Disclosure Date: April 20, 2022 (last updated November 29, 2024)
Certificate.Verify in crypto/x509 in Go 1.18.x before 1.18.1 can be caused to panic on macOS when presented with certain malformed certificates. This allows a remote TLS server to cause a TLS client to panic.
0