Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2023-27574
Disclosure Date: March 03, 2023 (last updated October 08, 2023)
ShadowsocksX-NG 1.10.0 signs with com.apple.security.get-task-allow entitlements because of CODE_SIGNING_INJECT_BASE_ENTITLEMENTS.
0
Attacker Value
Unknown
CVE-2019-5152
Disclosure Date: December 18, 2019 (last updated November 27, 2024)
An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2019-5164
Disclosure Date: December 03, 2019 (last updated November 27, 2024)
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2019-5163
Disclosure Date: December 03, 2019 (last updated November 27, 2024)
An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-16078
Disclosure Date: June 07, 2018 (last updated November 26, 2024)
shadowsock was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
0
Attacker Value
Unknown
CVE-2017-15924
Disclosure Date: October 27, 2017 (last updated November 26, 2024)
In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions.
0