Skip to content

TechMedia

Header Image
Category

HIGH

385 Posts

Featured

Posted byWpmaster
[Microsoft.NetCore.App.Runtime.win-arm] .NET Remote Code Execution Vulnerability
Posted byWpmaster
[github.com/traefik/traefik/v2] Traefik HTTP header parsing could cause a denial of service
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Exposure of Sensitive Information Through Metadata
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Insertion of Sensitive Information Into Sent Data

[github.com/shiyanhui/dht] shiyanhui/dht vulnerable to Uncontrolled Resource Consumption

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202212/31/2022

Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-36562
https://github.com/shiyanhui/dht/issues/57
https://pkg.go.dev/…

[github.com/peterzen/goresolver] go-resolver’s DNSSEC validation not performed correctly

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202212/29/2022

go-resolver’s DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self…

[github.com/ipld/go-codec-dagpb] go-codec-dagpb vulnerable to panic when decoding invalid blocks

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202201/11/2023

go-codec-dagpb is an implementation of the DAG-PB spec for Go. The dag-pb codec can panic when decoding invalid blocks. This issue has been patched in version 1.5.0.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-2584
https://github.com/ipld/go-…

[github.com/flynn/noise] Noise vulnerable to uncontrolled resource consumption

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202212/29/2022

Noise is a Go implementation of the Noise Protocol Framework. The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messag…

[github.com/tendermint/tendermint/rpc/client] Tendermint Client package vulnerable to Uncontrolled Resource Consumption

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202212/31/2022

Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.
Referen…

[github.com/btcsuitereleases/go-socks/socks] socks Infinite Loop vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202201/10/2023

The RemoteAddr and LocalAddr methods on the returned net.Conn may call themselves, leading to an infinite loop which will crash the program due to a stack overflow.
References

https://nvd.nist.gov/vuln/detail/CVE-2013-10005
https://github.com/btcsuite…

[com.github.dgarijo:Widoco] Widoco Path Traversal vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202201/10/2023

A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function unZipIt of the file src/main/java/widoco/WidocoUtils.java. The manipulation leads to path traversal. It is possible to launch the attack on the local…

[github.com/gin-gonic/gin] Gin’s default logger allows unsanitized input that can allow remote attackers to inject arbitrary log lines

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202212/30/2022

Gin is a HTTP web framework written in Go (Golang). Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-36567
htt…

[rdiffweb] rdiffweb vulnerable to Authentication Bypass by Primary Weakness

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202201/07/2023

In rdiffweb prior to 2.5.5, the username field is not unique to users. This allows exploitation of primary key logic by creating the same name with different combinations & may allow unauthorized access.
References

https://nvd.nist.gov/vuln/detail…

[rdiffweb] rdiffweb vulnerable to Open Redirect

  • Posted inHIGH
  • Posted byWpmaster
  • 12/28/202201/06/2023

Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-4720
https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d
https://huntr.dev/bounties/339687af-6e25-…

Posts navigation

Previous Posts 1 … 10 11 12 13 14 … 39 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close