Page 29 of 1101 results (0.015 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

16 Jul 2020 — An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a stack overflow in bits.c, possibly related to bit_read_TF. Se detectó un problema en GNU LibreDWG versiones hasta 0.9.3. Una entrada diseñada conllevará a un desbordamiento de la pila en el archivo bits.c, posiblemente relacionado con la función bit_read_TF • https://github.com/LibreDWG/libredwg/commit/b84c2cab55948a5ee70860779b2640913e3ee1ed • CWE-787: Out-of-bounds Write •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

16 Jul 2020 — An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec. Se detectó un problema en GNU LibreDWG versiones hasta 0.9.3. Una entrada diseñada conllevará a una sobre lectura del búfer en la región heap de la memoria en la función dwg_encode_entity en el archivo common_entity_data.spec • https://github.com/LibreDWG/libredwg/commit/3f503dd294efc63a59608d8a16058c41d44ba13a • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

16 Jul 2020 — An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_common_entity_handle_data in common_entity_handle_data.spec. Se detectó un problema en GNU LibreDWG versiones hasta 0.9.3. Se presenta una desreferencia del puntero NULL en la función dwg_encode_common_entity_handle_data en el archivo common_entity_handle_data.spec • https://github.com/LibreDWG/libredwg/commit/3b837bb72d6b9ab4d563faa211f90efc257e3c96 • CWE-476: NULL Pointer Dereference •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

16 Jul 2020 — An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in bit_write_TF in bits.c. Se detectó un problema en GNU LibreDWG versiones hasta 0.9.3. Una entrada diseñada conllevará a una lectura excesiva del búfer en la región heap de la memoria en la función bit_write_TF en el archivo bits.c • https://github.com/LibreDWG/libredwg/commit/95cc9300430d35feb05b06a9badf678419463dbe • CWE-125: Out-of-bounds Read •

CVSS: 4.7EPSS: 0%CPEs: 6EXPL: 0

24 Jun 2020 — GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page. GNU Mailman versiones anteriores a 2.1.33, permite una inyección de contenido arbitrario por medio de la página de inicio de sesión del archivo privado Cgi/private.py Several vulnerabilities were discovered in mailman, a web-based mailing list manager, which could result in arbitrary content injection via the options and private archive login pages, and CSRF attacks or privilege escalation via the... • http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

18 Jun 2020 — An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP ... • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

18 Jun 2020 — An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered. Se detectó un problema en adns versiones anteriores a 1.5.2. Se cuelga, consumiendo CPU, si un bucle de puntero de compresión es encontrado • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 0

18 Jun 2020 — An issue was discovered in adns before 1.5.2. It corrupts a pointer when a nameserver speaks first because of a wrong number of pointer dereferences. This bug may well be exploitable as a remote code execution. Se detectó un problema en adns versiones anteriores a 1.5.2. Corrompe un puntero cuando un servidor de nombres habla primero debido a un número incorrecto de desreferencias de puntero. • http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

18 Jun 2020 — An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn't, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. • http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

18 Jun 2020 — An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invali... • http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •