
CVE-2018-17846
https://notcve.org/view.php?id=CVE-2018-17846
01 Oct 2018 — The html package (aka x/net/html) through 2018-09-25 in Go mishandles <table><math><select><mi><select></table>, leading to an infinite loop during an html.Parse call because inSelectIM and inSelectInTableIM do not comply with a specification. El paquete html (también conocido como x/net/html) hasta el 2018-09-25 en Go gestiona de manera incorrecta , lo que conduce a un bucle infinito durante una llamada html.Parse. Esto se debe a que inSelectIM e inSelectInTableIM no cumplen con una especificación. • https://github.com/golang/go/issues/27842 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2018-17847
https://notcve.org/view.php?id=CVE-2018-17847
01 Oct 2018 — The html package (aka x/net/html) through 2018-09-25 in Go mishandles

CVE-2018-17848
https://notcve.org/view.php?id=CVE-2018-17848
01 Oct 2018 — The html package (aka x/net/html) through 2018-09-25 in Go mishandles

CVE-2018-17142
https://notcve.org/view.php?id=CVE-2018-17142
17 Sep 2018 — The html package (aka x/net/html) through 2018-09-17 in Go mishandles <math><template><mo><template>, leading to a "panic: runtime error" in parseCurrentToken in parse.go during an html.Parse call. El paquete html (también conocido como x/net/html) hasta el 2018-09-17 en Go gestiona de manera incorrecta , lo que conduce a un "panic: runtime error" en parseCurrentToken en parse.go durante una llamada html.Parse. • https://github.com/golang/go/issues/27702 • CWE-476: NULL Pointer Dereference •

CVE-2018-17143
https://notcve.org/view.php?id=CVE-2018-17143
17 Sep 2018 — The html package (aka x/net/html) through 2018-09-17 in Go mishandles <template><tBody><isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call. El paquete html (también conocido como x/net/html) hasta el 2018-09-17 en Go gestiona de manera incorrecta /action=0>, lo que conduce a un "panic: runtime error" en inBodyIM en parse.go durante una llamada html.Parse. • https://github.com/golang/go/issues/27704 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-17075
https://notcve.org/view.php?id=CVE-2018-17075
16 Sep 2018 — The html package (aka x/net/html) before 2018-07-13 in Go mishandles "in frameset" insertion mode, leading to a "panic: runtime error" for html.Parse of

CVE-2017-18342 – Gentoo Linux Security Advisory 202003-45
https://notcve.org/view.php?id=CVE-2017-18342
27 Jun 2018 — In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function. En PyYAML en versiones anteriores a 5.1, la API yaml.load () podría ejecutar código arbitrario si se usara con datos no confiables. La función load () ha quedado en desuso en la versión 5.1 y se ha introducido el "UnsafeLoader" para una compatibilidad hacia atrás con ... • https://github.com/marshmallow-code/apispec/issues/278 • CWE-502: Deserialization of Untrusted Data •

CVE-2018-1061 – python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
https://notcve.org/view.php?id=CVE-2018-1061
05 May 2018 — python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service. python en versiones anteriores a la 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 y 3.7.0 es vulnerable a backtracking catastrófico en el método difflib.IS_LINE_JUNK. Un atacante podría utilizar este fallo para provocar una denegación de servicio (DoS). A flaw was found in the way catastrophic backtracking was implem... • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html • CWE-20: Improper Input Validation •

CVE-2018-1060 – python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
https://notcve.org/view.php?id=CVE-2018-1060
05 May 2018 — python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service. Python antes de las versiones 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 y 3.7.0 es vulnerable a un retroceso catastrófico en el método apop () de pop3lib. Un atacante podría usar este fallo para causar la denegación de servicio. A flaw was found in the way catastrophic backtracking was implemented in python's pop3lib's a... • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html • CWE-20: Improper Input Validation •

CVE-2016-3110 – mod_cluster: remotely Segfault Apache http server
https://notcve.org/view.php?id=CVE-2016-3110
22 Aug 2016 — mod_cluster, as used in Red Hat JBoss Web Server 2.1, allows remote attackers to cause a denial of service (Apache http server crash) via an MCMP message containing a series of = (equals) characters after a legitimate element. mod_cluster, tal como se utiliza en Red Hat JBoss Web Server 2.1, permite a atacantes remotos provocar una denegación de servicio (caída del servidor http de Apache) a través de un mensaje MCMP que contiene una serie de caracteres = (iguales) después de un elemento legítimo. It was di... • http://rhn.redhat.com/errata/RHSA-2016-1648.html • CWE-20: Improper Input Validation •