2 results (0.006 seconds)

CVSS: 10.0EPSS: 94%CPEs: 398EXPL: 413

10 Dec 2021 — Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.... • https://packetstorm.news/files/id/171626 • CWE-20: Improper Input Validation CWE-400: Uncontrolled Resource Consumption CWE-502: Deserialization of Untrusted Data CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

09 Jun 2021 — ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA). ConnMan (también se conoce como Connection Manager) versiones 1.30 hasta 1.39, presenta un desbordamiento del búfer en la región stack de la memoria en el parámetro uncompress en el archivo dnsproxy.c por medio de NAME, RDATA o RDLENGTH (para A o AAAA) A buffer overflow in ConnMan might allow remote attacker(s) to execute arbitrary code. Versions less... • http://www.openwall.com/lists/oss-security/2021/06/09/1 • CWE-787: Out-of-bounds Write •