CVE-2020-16156
CPAN 2.28 allows Signature Verification Bypass. Devamını Oku
The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data. Devamını Oku
The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data. Devamını Oku
The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass. Devamını Oku
The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass. Devamını Oku
The NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file. Devamını Oku
The NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file. Devamını Oku
In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku Kaynak: National Vulnerability Database
Out of bounds read in ANGLE allowed a remote attacker to obtain sensitive data via a crafted HTML page. Devamını Oku
Out of bounds read in ANGLE allowed a remote attacker to obtain sensitive data via a crafted HTML page. Devamını Oku
In s/qmail through 4.0.07, an active MitM can inject arbitrary plaintext commands into a STARTTLS encrypted session between an SMTP client and s/qmail. This allows e-mail messages and user credentials to be sent to the MitM attacker. Devamını Oku
eGain Chat 15.5.5 allows XSS via the Name (aka full_name) field. Devamını Oku