Page 49 of 871 results (0.008 seconds)

CVSS: 3.3EPSS: 0%CPEs: 5EXPL: 0

In CISOfy Lynis 2.x through 2.7.5, the license key can be obtained by looking at the process list when a data upload is being performed. This license can be used to upload data to a central Lynis server. Although no data can be extracted by knowing the license key, it may be possible to upload the data of additional scans. En CISOfy Lynis versiones 2.x hasta 2.7.5, la clave de licencia puede ser obtenida mediante la búsqueda de la lista de procesos cuando se lleva cabo una carga de datos. Esta licencia puede ser usada para cargar datos en un servidor central de Lynis. • https://cisofy.com/security/cve/cve-2019-13033 https://lists.debian.org/debian-lts-announce/2020/06/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDCHEKNR3HPJRNHE5PYKFH5GNBADTPA7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBFHIX6RTHCK37FXMAAXP4KGAMLUFDUD • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records. Se detectó un problema en adns versiones anteriores a 1.5.2. pap_mailbox822 no comprueba apropiadamente st desde adns__findlabel_next. • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ https://www.chiark.greenend.org.uk/piper • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered. Se detectó un problema en adns versiones anteriores a 1.5.2. Se cuelga, consumiendo CPU, si un bucle de puntero de compresión es encontrado • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ https://www.chiark.greenend.org.uk/piper • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 0

An issue was discovered in adns before 1.5.2. It corrupts a pointer when a nameserver speaks first because of a wrong number of pointer dereferences. This bug may well be exploitable as a remote code execution. Se detectó un problema en adns versiones anteriores a 1.5.2. Corrompe un puntero cuando un servidor de nombres habla primero debido a un número incorrecto de desreferencias de puntero. • http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn't, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. • http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •