Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2024-3566
Disclosure Date: April 10, 2024 (last updated April 11, 2024)
A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
0
Attacker Value
Unknown
CVE-2021-4249
Disclosure Date: December 18, 2022 (last updated February 24, 2025)
A vulnerability was found in xml-conduit. It has been classified as problematic. Affected is an unknown function of the file xml-conduit/src/Text/XML/Stream/Parse.hs of the component DOCTYPE Entity Expansion Handler. The manipulation leads to infinite loop. It is possible to launch the attack remotely. Upgrading to version 1.9.1.0 is able to address this issue. The name of the patch is 4be1021791dcdee8b164d239433a2043dc0939ea. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216204.
0
Attacker Value
Unknown
CVE-2022-3433
Disclosure Date: October 10, 2022 (last updated February 24, 2025)
The aeson library is not safe to use to consume untrusted JSON input. A remote user could abuse this flaw to produce a hash collision in the underlying unordered-containers library by sending specially crafted JSON data, resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2021-30502
Disclosure Date: April 25, 2021 (last updated November 28, 2024)
The unofficial vscode-ghc-simple (aka Simple Glasgow Haskell Compiler) extension before 0.2.3 for Visual Studio Code allows remote code execution via a crafted workspace configuration with replCommand.
0
Attacker Value
Unknown
CVE-2013-0243
Disclosure Date: December 05, 2019 (last updated November 27, 2024)
haskell-tls-extra before 0.6.1 has Basic Constraints attribute vulnerability may lead to Man in the Middle attacks on TLS connections
0