Show filters
112 Total Results
Displaying 91-100 of 112
Sort by:
Attacker Value
Unknown

CVE-2018-17846

Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <table><math><select><mi><select></table>, leading to an infinite loop during an html.Parse call because inSelectIM and inSelectInTableIM do not comply with a specification.
Attacker Value
Unknown

CVE-2018-17848

Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <math><template><mn><b></template>, leading to a "panic: runtime error" (index out of range) in (*insertionModeStack).pop in node.go, called from inHeadIM, during an html.Parse call.
Attacker Value
Unknown

CVE-2018-17847

Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <svg><template><desc><t><svg></template>, leading to a "panic: runtime error" (index out of range) in (*nodeStack).pop in node.go, called from (*parser).clearActiveFormattingElements, during an html.Parse call.
Attacker Value
Unknown

CVE-2018-17143

Disclosure Date: September 17, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <template><tBody><isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call.
Attacker Value
Unknown

CVE-2018-17142

Disclosure Date: September 17, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <math><template><mo><template>, leading to a "panic: runtime error" in parseCurrentToken in parse.go during an html.Parse call.
Attacker Value
Unknown

CVE-2018-17075

Disclosure Date: September 16, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) before 2018-07-13 in Go mishandles "in frameset" insertion mode, leading to a "panic: runtime error" for html.Parse of <template><object>, <template><applet>, or <template><marquee>. This is related to HTMLTreeBuilder.cpp in WebKit.
Attacker Value
Unknown

CVE-2018-14599

Disclosure Date: August 24, 2018 (last updated November 08, 2023)
An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
Attacker Value
Unknown

CVE-2018-14598

Disclosure Date: August 24, 2018 (last updated November 08, 2023)
An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
0
Attacker Value
Unknown

CVE-2018-14348

Disclosure Date: August 14, 2018 (last updated November 08, 2023)
libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.
0
Attacker Value
Unknown

CVE-2017-18342

Disclosure Date: June 27, 2018 (last updated November 08, 2023)
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.