Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown
CVE-2021-42219
Disclosure Date: March 17, 2022 (last updated October 07, 2023)
Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go.
0
Attacker Value
Unknown
CVE-2021-43668
Disclosure Date: November 18, 2021 (last updated October 07, 2023)
Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with "runtime error: invalid memory address or nil pointer dereference" and arise a SEGV signal.
0
Attacker Value
Unknown
CVE-2019-16355
Disclosure Date: September 16, 2019 (last updated November 27, 2024)
The File Session Manager in Beego 1.10.0 allows local users to read session files because of weak permissions for individual files.
0
Attacker Value
Unknown
CVE-2019-16354
Disclosure Date: September 16, 2019 (last updated November 27, 2024)
The File Session Manager in Beego 1.10.0 allows local users to read session files because there is a race condition involving file creation within a directory with weak permissions.
0
Attacker Value
Unknown
CVE-2018-6574
Disclosure Date: February 07, 2018 (last updated November 08, 2023)
Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
0
Attacker Value
Unknown
CVE-2017-12794
Disclosure Date: September 07, 2017 (last updated November 26, 2024)
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings.
0
Attacker Value
Unknown
CVE-2017-7233
Disclosure Date: April 04, 2017 (last updated November 26, 2024)
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
0
Attacker Value
Unknown
CVE-2017-7234
Disclosure Date: April 04, 2017 (last updated November 26, 2024)
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
0
Attacker Value
Unknown
CVE-2016-9014
Disclosure Date: December 09, 2016 (last updated November 08, 2023)
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
0
Attacker Value
Unknown
CVE-2016-9013
Disclosure Date: December 09, 2016 (last updated November 08, 2023)
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
0