Логотип exploitDog
product: "mysql_server"
Консоль
Логотип exploitDog

exploitDog

product: "mysql_server"

Количество 1 198

Количество 1 198

suse-cvrf логотип

openSUSE-SU-2021:1762-1

больше 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0808-1

больше 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2062-1

почти 5 лет назад

Security update for krb5

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2037-1

почти 5 лет назад

Security update for krb5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1763-1

больше 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1762-1

больше 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14760-1

больше 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14735-1

больше 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3379-1

почти 5 лет назад

Security update for krb5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3377-1

почти 5 лет назад

Security update for krb5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3375-1

почти 5 лет назад

Security update for krb5

EPSS: Низкий
rocky логотип

RLSA-2021:4511

почти 4 года назад

Moderate: curl security and bug fix update

EPSS: Низкий
github логотип

GHSA-rjqf-6h27-xqfp

больше 3 лет назад

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-qhhj-q26m-mrw8

больше 3 лет назад

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-7w8r-q58w-5wcr

больше 3 лет назад

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVSS3: 3.1
EPSS: Низкий
github логотип

GHSA-39wv-qjgj-4jxg

больше 3 лет назад

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-2wgw-3mv7-47xf

больше 3 лет назад

MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-21824

больше 3 лет назад

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
EPSS: Низкий
redhat логотип

CVE-2022-21824

почти 4 года назад

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
EPSS: Низкий
nvd логотип

CVE-2022-21824

больше 3 лет назад

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
openSUSE-SU-2021:1762-1

Security update for curl

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0808-1

Security update for curl

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2062-1

Security update for krb5

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2037-1

Security update for krb5

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:1763-1

Security update for curl

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1762-1

Security update for curl

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14760-1

Security update for curl

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14735-1

Security update for curl

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:3379-1

Security update for krb5

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3377-1

Security update for krb5

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3375-1

Security update for krb5

0%
Низкий
почти 5 лет назад
rocky логотип
RLSA-2021:4511

Moderate: curl security and bug fix update

0%
Низкий
почти 4 года назад
github логотип
GHSA-rjqf-6h27-xqfp

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-qhhj-q26m-mrw8

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.

CVSS3: 3.7
1%
Низкий
больше 3 лет назад
github логотип
GHSA-7w8r-q58w-5wcr

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVSS3: 3.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-39wv-qjgj-4jxg

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2wgw-3mv7-47xf

MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2022-21824

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-21824

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-21824

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу