Show filters
817 Total Results
Displaying 631-640 of 817
Sort by:
Attacker Value
Unknown
CVE-2020-7919
Disclosure Date: March 16, 2020 (last updated November 08, 2023)
Go before 1.12.16 and 1.13.x before 1.13.7 (and the crypto/cryptobyte package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients (resulting in a panic) via a malformed X.509 certificate.
0
Attacker Value
Unknown
CVE-2019-18336
Disclosure Date: March 10, 2020 (last updated November 27, 2024)
A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V3.X.17), SIMATIC TDC CP51M1 (All versions < V1.1.8), SIMATIC TDC CPU555 (All versions < V1.1.1), SINUMERIK 840D sl (All versions < V4.8.6), SINUMERIK 840D sl (All versions < V4.94). Specially crafted packets sent to port 102/tcp (Profinet) could cause the affected device to go into defect mode. A restart is required in order to recover the system. Successful exploitation requires an attacker to have network access to port 102/tcp, with no authentication. No user interation is required. At the time of advisory publication no public exploitation of this security vulnerability was known.
0
Attacker Value
Unknown
CVE-2020-9283
Disclosure Date: February 20, 2020 (last updated November 08, 2023)
golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client.
0
Attacker Value
Unknown
CVE-2020-8945
Disclosure Date: February 12, 2020 (last updated November 08, 2023)
The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.
0
Attacker Value
Unknown
CVE-2015-5741
Disclosure Date: February 08, 2020 (last updated November 28, 2024)
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
0
Attacker Value
Unknown
CVE-2014-4536
Disclosure Date: December 27, 2019 (last updated November 27, 2024)
Multiple cross-site scripting (XSS) vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter.
0
Attacker Value
Unknown
CVE-2019-19794
Disclosure Date: December 13, 2019 (last updated November 27, 2024)
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
0
Attacker Value
Unknown
CVE-2019-19602
Disclosure Date: December 05, 2019 (last updated November 27, 2024)
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.
0
Attacker Value
Unknown
CVE-2019-19516
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Intelbras WRN 150 1.0.18 devices allow CSRF via GO=system_password.asp to the goform/SysToolChangePwd URI to change a password.
0
Attacker Value
Unknown
CVE-2019-12523
Disclosure Date: November 26, 2019 (last updated November 08, 2023)
An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.
0