Page 2 of 7 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.1.0. This bug can be leveraged by constructing a message whose payload is nil and sending this message with the method 'forwardToLeader'. This bug has been admitted and fixed by the developers of Fabric. If leveraged, any leader node will crash. Se ha detectado una vulnerabilidad en HyperLedger Fabric versiones v1.4.0, v2.0.0, v2.1.0. • https://github.com/hyperledger/fabric/pull/2844 https://jira.hyperledger.org/browse/FAB-18529 • CWE-476: NULL Pointer Dereference •

CVSS: 4.4EPSS: 0%CPEs: 11EXPL: 0

Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/. Fabric anteriores a v1.1.0 permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos en (1) un fichero /tmp/fab.*. o (2) algunos ficheros en el nivel superior de /tmp/. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629003 http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062534.html http://www.openwall.com/lists/oss-security/2011/06/03/5 http://www.openwall.com/lists/oss-security/2011/06/06/12 https://bugzilla.redhat.com/show_bug.cgi?id=710462 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •