Apache

Bookkeeper

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 15.12.2022 19:15:17
  • Zuletzt bearbeitet 17.04.2025 19:15:53

The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves the bookkeeper client vulnerable to a man in the middle attack. The problem af...

Exploit
  • EPSS 3.79%
  • Veröffentlicht 21.04.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:14:13

An issue was discovered in giflib through 5.1.4. DumpScreen2RGB in gif2rgb.c has a heap-based buffer over-read.

  • EPSS 1.72%
  • Veröffentlicht 26.01.2021 18:15:57
  • Zuletzt bearbeitet 21.11.2024 05:29:06

A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.

  • EPSS 4.74%
  • Veröffentlicht 24.12.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:35:40

SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.

  • EPSS 53.46%
  • Veröffentlicht 20.12.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:32:33

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic fo...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 19.12.2019 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:37

cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c ...

  • EPSS 0.92%
  • Veröffentlicht 22.05.2017 19:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Co...