Show filters
816 Total Results
Displaying 591-600 of 816
Sort by:
Attacker Value
Unknown
CVE-2020-26240
Disclosure Date: November 25, 2020 (last updated November 28, 2024)
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. An ethash mining DAG generation flaw in Geth before version 1.9.24 could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. This issue is fixed as of 1.9.24
0
Attacker Value
Unknown
CVE-2020-26242
Disclosure Date: November 25, 2020 (last updated November 28, 2024)
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.18, there is a Denial-of-service (crash) during block processing. This is fixed in 1.9.18.
0
Attacker Value
Unknown
CVE-2020-28334
Disclosure Date: November 24, 2020 (last updated November 28, 2024)
Barco wePresent WiPG-1600W devices use Hard-coded Credentials (issue 2 of 2). Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19. The Barco wePresent WiPG-1600W device has a hardcoded root password hash included in the firmware image. Exploiting CVE-2020-28329, CVE-2020-28330 and CVE-2020-28331 could potentially be used in a simple and automated exploit chain to go from unauthenticated remote attacker to root shell.
0
Attacker Value
Unknown
CVE-2020-28367
Disclosure Date: November 18, 2020 (last updated November 08, 2023)
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.
0
Attacker Value
Unknown
CVE-2020-28366
Disclosure Date: November 18, 2020 (last updated November 08, 2023)
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
0
Attacker Value
Unknown
CVE-2020-28362
Disclosure Date: November 18, 2020 (last updated November 08, 2023)
Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.
0
Attacker Value
Unknown
CVE-2020-26222
Disclosure Date: November 13, 2020 (last updated November 28, 2024)
Dependabot is a set of packages for automated dependency management for Ruby, JavaScript, Python, PHP, Elixir, Rust, Java, .NET, Elm and Go. In Dependabot-Core from version 0.119.0.beta1 before version 0.125.1, there is a remote code execution vulnerability in dependabot-common and dependabot-go_modules when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: "/$({curl,127.0.0.1})", Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository. The fix was applied to version 0.125.1. As a workaround, one can escape the branch name prior to passing it to the Dependabot::Source class.
0
Attacker Value
Unknown
CVE-2020-26521
Disclosure Date: November 06, 2020 (last updated November 08, 2023)
The JWT library in NATS nats-server before 2.1.9 allows a denial of service (a nil dereference in Go code).
0
Attacker Value
Unknown
CVE-2020-10937
Disclosure Date: November 02, 2020 (last updated November 28, 2024)
An issue was discovered in IPFS (aka go-ipfs) 0.4.23. An attacker can generate ephemeral identities (Sybils) and leverage the IPFS connection management reputation system to poison other nodes' routing tables, eclipsing the nodes that are the target of the attack from the rest of the network. Later versions, in particular go-ipfs 0.7, mitigate this.
0
Attacker Value
Unknown
CVE-2020-15233
Disclosure Date: October 02, 2020 (last updated November 28, 2024)
ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1.
0