Show filters
819 Total Results
Displaying 671-680 of 819
Sort by:
Attacker Value
Unknown

CVE-2019-9741

Disclosure Date: March 13, 2019 (last updated November 08, 2023)
An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.
Attacker Value
Unknown

CVE-2019-9634

Disclosure Date: March 08, 2019 (last updated November 27, 2024)
Go through 1.12 on Windows misuses certain LoadLibrary functionality, leading to DLL injection.
Attacker Value
Unknown

CVE-2018-17419

Disclosure Date: March 07, 2019 (last updated November 27, 2024)
An issue was discovered in setTA in scan_rr.go in the Miek Gieben DNS library before 1.0.10 for Go. A dns.ParseZone() parsing error causes a segmentation violation, leading to denial of service.
Attacker Value
Unknown

CVE-2018-20744

Disclosure Date: January 28, 2019 (last updated November 27, 2024)
The Olivier Poitrey Go CORS handler through 1.3.0 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems.
0
Attacker Value
Unknown

CVE-2019-6486

Disclosure Date: January 24, 2019 (last updated November 08, 2023)
Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
0
Attacker Value
Unknown

CVE-2018-18908

Disclosure Date: January 20, 2019 (last updated November 27, 2024)
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requests contain potentially sensitive information that could be useful to an attacker, such as the victim's Sky username.
0
Attacker Value
Unknown

Junos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malf…

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
On QFX and PTX Series, receipt of a malformed packet for J-Flow sampling might crash the FPC (Flexible PIC Concentrator) process which causes all interfaces to go down. By continuously sending the offending packet, an attacker can repeatedly crash the FPC process causing a sustained Denial of Service (DoS). This issue affects both IPv4 and IPv6 packet processing. Affected releases are Juniper Networks Junos OS on QFX and PTX Series: 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1; 18.2 versions prior to 18.2R1-S3, 18.2R2; 17.2X75 versions prior to 17.2X75-D91, 17.2X75-D100.
0
Attacker Value
Unknown

CVE-2018-20421

Disclosure Date: December 24, 2018 (last updated November 27, 2024)
Go Ethereum (aka geth) 1.8.19 allows attackers to cause a denial of service (memory consumption) by rewriting the length of a dynamic array in memory, and then writing data to a single memory location with a large index number, as demonstrated by use of "assembly { mstore }" followed by a "c[0xC800000] = 0xFF" assignment.
0
Attacker Value
Unknown

CVE-2018-16873

Disclosure Date: December 14, 2018 (last updated November 08, 2023)
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named ".git" by using a vanity import path that ends with "/.git". If the Git repository root contains a "HEAD" file, a "config" file, an "objects" directory, a "refs" directory, with some work to ensure the proper ordering of operations, "go get -u" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the "config" file in the original Git repository root for its configuration, and if that config file contains malicious command…
Attacker Value
Unknown

CVE-2018-16875

Disclosure Date: December 14, 2018 (last updated November 08, 2023)
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
0