Show filters
112 Total Results
Displaying 91-100 of 112
Sort by:
Attacker Value
Unknown
CVE-2018-17846
Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <table><math><select><mi><select></table>, leading to an infinite loop during an html.Parse call because inSelectIM and inSelectInTableIM do not comply with a specification.
0
Attacker Value
Unknown
CVE-2018-17848
Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <math><template><mn><b></template>, leading to a "panic: runtime error" (index out of range) in (*insertionModeStack).pop in node.go, called from inHeadIM, during an html.Parse call.
0
Attacker Value
Unknown
CVE-2018-17847
Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <svg><template><desc><t><svg></template>, leading to a "panic: runtime error" (index out of range) in (*nodeStack).pop in node.go, called from (*parser).clearActiveFormattingElements, during an html.Parse call.
0
Attacker Value
Unknown
CVE-2018-17143
Disclosure Date: September 17, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <template><tBody><isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call.
0
Attacker Value
Unknown
CVE-2018-17142
Disclosure Date: September 17, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <math><template><mo><template>, leading to a "panic: runtime error" in parseCurrentToken in parse.go during an html.Parse call.
0
Attacker Value
Unknown
CVE-2018-17075
Disclosure Date: September 16, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) before 2018-07-13 in Go mishandles "in frameset" insertion mode, leading to a "panic: runtime error" for html.Parse of <template><object>, <template><applet>, or <template><marquee>. This is related to HTMLTreeBuilder.cpp in WebKit.
0
Attacker Value
Unknown
CVE-2018-14599
Disclosure Date: August 24, 2018 (last updated November 08, 2023)
An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
0
Attacker Value
Unknown
CVE-2018-14598
Disclosure Date: August 24, 2018 (last updated November 08, 2023)
An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
0
Attacker Value
Unknown
CVE-2018-14348
Disclosure Date: August 14, 2018 (last updated November 08, 2023)
libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.
0
Attacker Value
Unknown
CVE-2017-18342
Disclosure Date: June 27, 2018 (last updated November 08, 2023)
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
0