Show filters
820 Total Results
Displaying 711-720 of 820
Sort by:
Attacker Value
Unknown

Potential Information Disclosure in Sentinel

Disclosure Date: March 07, 2018 (last updated November 08, 2023)
In NetIQ Sentinel before 8.1.x, a Sentinel user is logged into the Sentinel Web Interface. After performing some tasks within Sentinel the user does not log out but does go idle for a period of time. This in turn causes the interface to timeout so that it requires the user to re-authenticate. If another user is passing by and decides to login, their credentials are accepted. While The user does not inherit any of the other users privileges, they are able to view the previous screen. In this case it is possible that the user can see another users events or configuration information for whatever view is currently showing.
0
Attacker Value
Unknown

CVE-2017-6927

Disclosure Date: March 01, 2018 (last updated November 26, 2024)
Drupal 8.4.x versions before 8.4.5 and Drupal 7.x versions before 7.57 has a Drupal.checkPlain() JavaScript function which is used to escape potentially dangerous text before outputting it to HTML (as JavaScript output does not typically go through Twig autoescaping). This function does not correctly handle all methods of injecting malicious HTML, leading to a cross-site scripting vulnerability under certain circumstances. The PHP functions which Drupal provides for HTML escaping are not affected.
0
Attacker Value
Unknown

CVE-2018-7421

Disclosure Date: February 23, 2018 (last updated November 08, 2023)
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification.
Attacker Value
Unknown

CVE-2018-7187

Disclosure Date: February 16, 2018 (last updated November 26, 2024)
The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.
Attacker Value
Unknown

CVE-2016-5397

Disclosure Date: February 12, 2018 (last updated November 08, 2023)
The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.
0
Attacker Value
Unknown

CVE-2018-6574

Disclosure Date: February 07, 2018 (last updated November 08, 2023)
Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
0
Attacker Value
Unknown

CVE-2017-17529

Disclosure Date: December 14, 2017 (last updated November 26, 2024)
af/util/xp/ut_go_file.cpp in AbiWord 3.0.2-2 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
0
Attacker Value
Unknown

CVE-2017-10891

Disclosure Date: December 01, 2017 (last updated November 26, 2024)
Untrusted search path vulnerability in Media Go version 3.2.0.191 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
0
Attacker Value
Unknown

CVE-2017-9701

Disclosure Date: November 16, 2017 (last updated November 26, 2024)
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing OEM unlock/unlock-go fastboot commands data leak may occur, resulting from writing uninitialized stack structure to non-volatile memory.
0
Attacker Value
Unknown

CVE-2015-5740

Disclosure Date: October 18, 2017 (last updated November 26, 2024)
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request with two Content-length headers.
0