16 results (0.029 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/..\..\asd becomes ..\..\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened. • https://go.dev/cl/408694 https://go.dev/issue/53082 https://pkg.go.dev/vuln/GO-2024-2961 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Parsing a corrupt or malicious image with invalid color indices can cause a panic. • https://go.dev/cl/588115 https://go.dev/issue/67624 https://pkg.go.dev/vuln/GO-2024-2937 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. • http://www.openwall.com/lists/oss-security/2024/04/03/16 http://www.openwall.com/lists/oss-security/2024/04/05/4 https://go.dev/cl/576155 https://go.dev/issue/65051 https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT https://pkg.go.dev/vuln/GO-2024-2687 https://security.netapp.com/advisory/ntap-20240419-0009 https://access.redhat.com/security/ • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.4EPSS: 2%CPEs: 22EXPL: 0

Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure. Vulnerabilidad de uso después de liberación en la función dolmageText en dix/dixfonts.c del módulo xorg-server anterior a la versión 1.14.4 en X.Org X11 permite a usuarios remotos autenticados provocar una denegación de servicio (cuelgue del demonio) o posiblemente ejecutar código arbitrario a través de una petición ImageText manipulada que provoque un fallo de reubicación de memoria. • http://lists.opensuse.org/opensuse-updates/2013-10/msg00056.html http://lists.opensuse.org/opensuse-updates/2013-10/msg00060.html http://lists.x.org/archives/xorg-announce/2013-October/002332.html http://openwall.com/lists/oss-security/2013/10/08/6 http://rhn.redhat.com/errata/RHSA-2013-1426.html http://www.debian.org/security/2013/dsa-2784 http://www.securityfocus.com/bid/62892 http://www.ubuntu.com/usn/USN-1990-1 https://bugzilla.redhat.com/show_bug.cgi?id=1 • CWE-399: Resource Management Errors CWE-416: Use After Free •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty. X.Org X server anterior a v1.13.4 y v1.4.x anterior a v1.14.1 no restringe adecuadamente el acceso a los eventos de entrada cuando se añade un nuevo dispositivo de conexión en caliente, lo cual puede permitir a atacantes cercanos obtener información sensible, como se ha demostrado mediante la lectura de contraseñas de un tty. • http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html http://www.debian.org/security/2013/dsa-2661 http://www.openwall.com/lists/oss-security/2013/04/18/3 http://www.ubuntu.com/usn/USN-1803-1 https://bugs.freedesktop.org/show_bug.cgi?id=63353 https://access.redhat.com/security/cve/CVE-2013-1940 https:/& • CWE-264: Permissions, Privileges, and Access Controls •