Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2004-0837

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-16 Oct, 2004 | 04:00
Updated At-08 Aug, 2024 | 00:31
Rejected At-
Credits

MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:16 Oct, 2004 | 04:00
Updated At:08 Aug, 2024 | 00:31
Rejected At:
▼CVE Numbering Authority (CNA)

MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.mysql.com/internals/16174
x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2004-611.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/12783/
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2004/dsa-562
vendor-advisory
x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=110140517515735&w=2
mailing-list
x_refsource_BUGTRAQ
http://lists.mysql.com/internals/16173
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/17667
vdb-entry
x_refsource_XF
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
vendor-advisory
x_refsource_SUNALERT
http://www.securityfocus.com/bid/11357
vdb-entry
x_refsource_BID
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892
vendor-advisory
x_refsource_CONECTIVA
http://www.redhat.com/support/errata/RHSA-2004-597.html
vendor-advisory
x_refsource_REDHAT
http://www.ciac.org/ciac/bulletins/p-018.shtml
third-party-advisory
government-resource
x_refsource_CIAC
http://lists.mysql.com/internals/16168
x_refsource_MISC
http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml
vendor-advisory
x_refsource_GENTOO
http://www.trustix.org/errata/2004/0054/
vendor-advisory
x_refsource_TRUSTIX
http://bugs.mysql.com/2408
x_refsource_MISC
http://securitytracker.com/id?1011606
vdb-entry
x_refsource_SECTRACK
http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15
x_refsource_MISC
Hyperlink: http://lists.mysql.com/internals/16174
Resource:
x_refsource_MISC
Hyperlink: http://www.redhat.com/support/errata/RHSA-2004-611.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/12783/
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2004/dsa-562
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://marc.info/?l=bugtraq&m=110140517515735&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.mysql.com/internals/16173
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/17667
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.securityfocus.com/bid/11357
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892
Resource:
vendor-advisory
x_refsource_CONECTIVA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2004-597.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.ciac.org/ciac/bulletins/p-018.shtml
Resource:
third-party-advisory
government-resource
x_refsource_CIAC
Hyperlink: http://lists.mysql.com/internals/16168
Resource:
x_refsource_MISC
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.trustix.org/errata/2004/0054/
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://bugs.mysql.com/2408
Resource:
x_refsource_MISC
Hyperlink: http://securitytracker.com/id?1011606
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.mysql.com/internals/16174
x_refsource_MISC
x_transferred
http://www.redhat.com/support/errata/RHSA-2004-611.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/12783/
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2004/dsa-562
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://marc.info/?l=bugtraq&m=110140517515735&w=2
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.mysql.com/internals/16173
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/17667
vdb-entry
x_refsource_XF
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.securityfocus.com/bid/11357
vdb-entry
x_refsource_BID
x_transferred
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892
vendor-advisory
x_refsource_CONECTIVA
x_transferred
http://www.redhat.com/support/errata/RHSA-2004-597.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.ciac.org/ciac/bulletins/p-018.shtml
third-party-advisory
government-resource
x_refsource_CIAC
x_transferred
http://lists.mysql.com/internals/16168
x_refsource_MISC
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.trustix.org/errata/2004/0054/
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://bugs.mysql.com/2408
x_refsource_MISC
x_transferred
http://securitytracker.com/id?1011606
vdb-entry
x_refsource_SECTRACK
x_transferred
http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15
x_refsource_MISC
x_transferred
Hyperlink: http://lists.mysql.com/internals/16174
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2004-611.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/12783/
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2004/dsa-562
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=110140517515735&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.mysql.com/internals/16173
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/17667
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.securityfocus.com/bid/11357
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892
Resource:
vendor-advisory
x_refsource_CONECTIVA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2004-597.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.ciac.org/ciac/bulletins/p-018.shtml
Resource:
third-party-advisory
government-resource
x_refsource_CIAC
x_transferred
Hyperlink: http://lists.mysql.com/internals/16168
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.trustix.org/errata/2004/0054/
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://bugs.mysql.com/2408
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://securitytracker.com/id?1011606
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:03 Nov, 2004 | 05:00
Updated At:03 Apr, 2025 | 01:03

MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.02.6LOW
AV:N/AC:H/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 2.6
Base severity: LOW
Vector:
AV:N/AC:H/Au:N/C:N/I:N/A:P
CPE Matches

mysql
mysql
>>mysql>>4.1.0
cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>mysql>>Versions from 3.20(inclusive) to 3.23.49(exclusive)
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>mysql>>Versions from 4.0.0(inclusive) to 4.0.21(exclusive)
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>3.0
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.mysql.com/2408cve@mitre.org
Exploit
Vendor Advisory
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892cve@mitre.org
Broken Link
http://lists.mysql.com/internals/16168cve@mitre.org
Vendor Advisory
http://lists.mysql.com/internals/16173cve@mitre.org
Vendor Advisory
http://lists.mysql.com/internals/16174cve@mitre.org
Vendor Advisory
http://marc.info/?l=bugtraq&m=110140517515735&w=2cve@mitre.org
Mailing List
Third Party Advisory
http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15cve@mitre.org
N/A
http://secunia.com/advisories/12783/cve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1011606cve@mitre.org
Third Party Advisory
VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1cve@mitre.org
Broken Link
http://www.ciac.org/ciac/bulletins/p-018.shtmlcve@mitre.org
Broken Link
http://www.debian.org/security/2004/dsa-562cve@mitre.org
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200410-22.xmlcve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2004-597.htmlcve@mitre.org
Patch
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-611.htmlcve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/11357cve@mitre.org
Third Party Advisory
VDB Entry
http://www.trustix.org/errata/2004/0054/cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/17667cve@mitre.org
Third Party Advisory
VDB Entry
http://bugs.mysql.com/2408af854a3a-2127-422b-91ae-364da2661108
Exploit
Vendor Advisory
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.mysql.com/internals/16168af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://lists.mysql.com/internals/16173af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://lists.mysql.com/internals/16174af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://marc.info/?l=bugtraq&m=110140517515735&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/12783/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1011606af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.ciac.org/ciac/bulletins/p-018.shtmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2004/dsa-562af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200410-22.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2004-597.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-611.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/11357af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.trustix.org/errata/2004/0054/af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/17667af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
Hyperlink: http://bugs.mysql.com/2408
Source: cve@mitre.org
Resource:
Exploit
Vendor Advisory
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://lists.mysql.com/internals/16168
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://lists.mysql.com/internals/16173
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://lists.mysql.com/internals/16174
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=110140517515735&w=2
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/12783/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://securitytracker.com/id?1011606
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://www.ciac.org/ciac/bulletins/p-018.shtml
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://www.debian.org/security/2004/dsa-562
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2004-597.html
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2004-611.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/11357
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.trustix.org/errata/2004/0054/
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/17667
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://bugs.mysql.com/2408
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Vendor Advisory
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.mysql.com/internals/16168
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://lists.mysql.com/internals/16173
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://lists.mysql.com/internals/16174
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=110140517515735&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/12783/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://securitytracker.com/id?1011606
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.ciac.org/ciac/bulletins/p-018.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.debian.org/security/2004/dsa-562
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2004-597.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2004-611.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/11357
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.trustix.org/errata/2004/0054/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/17667
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

21Records found

CVE-2010-0900
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.6||LOW
EPSS-0.70% / 71.19%
||
7 Day CHG~0.00%
Published-13 Jul, 2010 | 22:07
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Network Layer component in Oracle Database Server 9.2.0.8, 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1, when running on Windows, allows remote attackers to affect availability via unknown vectors.

Action-Not Available
Vendor-n/aOracle CorporationMicrosoft Corporation
Product-windowsdatabase_servern/a
CVE-2018-9251
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.35% / 56.57%
||
7 Day CHG~0.00%
Published-04 Apr, 2018 | 02:00
Updated-05 Aug, 2024 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035.

Action-Not Available
Vendor-n/alibxml2 (XMLSoft)Debian GNU/Linux
Product-debian_linuxlibxml2n/a
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2009-3094
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-3.28% / 86.68%
||
7 Day CHG~0.00%
Published-08 Sep, 2009 | 18:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

Action-Not Available
Vendor-n/aThe Apache Software FoundationFedora ProjectDebian GNU/Linux
Product-http_serverdebian_linuxfedoran/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2015-8035
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-1.05% / 76.65%
||
7 Day CHG~0.00%
Published-18 Nov, 2015 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.

Action-Not Available
Vendor-n/aApple Inc.Debian GNU/LinuxCanonical Ltd.libxml2 (XMLSoft)
Product-libxml2watchosubuntu_linuxdebian_linuxiphone_osmac_os_xtvosn/a
CVE-2018-20185
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.90% / 74.66%
||
7 Day CHG~0.00%
Published-17 Dec, 2018 | 17:00
Updated-05 Aug, 2024 | 11:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GraphicsMagick 1.4 snapshot-20181209 Q8 on 32-bit platforms, there is a heap-based buffer over-read in the ReadBMPImage function of bmp.c, which allows attackers to cause a denial of service via a crafted bmp image file. This only affects GraphicsMagick installations with customized BMP limits.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.GraphicsMagick
Product-ubuntu_linuxdebian_linuxgraphicsmagickn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2016-5561
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-3.1||LOW
EPSS-0.68% / 70.58%
||
7 Day CHG~0.00%
Published-25 Oct, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Sun Solaris 11.3 allows remote attackers to affect availability via vectors related to IKE.

Action-Not Available
Vendor-n/aOracle Corporation
Product-solarisn/a
CVE-2021-35588
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-3.1||LOW
EPSS-0.09% / 25.93%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 10:50
Updated-04 Aug, 2024 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Debian GNU/LinuxNetApp, Inc.Oracle CorporationFedora Project
Product-openjdkdebian_linuxgraalvmsnapmanagerhci_management_nodee-series_santricity_os_controlleractive_iq_unified_managere-series_santricity_storage_managerfedorae-series_santricity_web_servicesoncommand_workflow_automationsolidfiresantricity_unified_manageroncommand_insightJava SE JDK and JRE
CVE-2025-4215
Matching Score-8
Assigner-VulDB
ShareView Details
Matching Score-8
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.16% / 37.68%
||
7 Day CHG~0.00%
Published-02 May, 2025 | 20:31
Updated-17 Jun, 2025 | 14:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
gorhill uBlock Origin UI 1p-filters.js currentStateChanged redos

A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.63.3b17 is able to address this issue. The patch is identified as eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c. It is recommended to upgrade the affected component.

Action-Not Available
Vendor-ublockorigingorhillDebian GNU/Linux
Product-debian_linuxublock_originuBlock Origin
CWE ID-CWE-1333
Inefficient Regular Expression Complexity
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-29473
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-2.5||LOW
EPSS-0.14% / 35.18%
||
7 Day CHG~0.00%
Published-26 Apr, 2021 | 00:00
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata

Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security.

Action-Not Available
Vendor-Debian GNU/LinuxFedora ProjectExiv2
Product-exiv2debian_linuxfedoraexiv2
CWE ID-CWE-125
Out-of-bounds Read
CVE-2014-2431
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.6||LOW
EPSS-1.13% / 77.45%
||
7 Day CHG~0.00%
Published-16 Apr, 2014 | 02:05
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.

Action-Not Available
Vendor-n/aRed Hat, Inc.Oracle CorporationMariaDB Foundation
Product-enterprise_linux_serverenterprise_linux_server_aussolarisenterprise_linux_eusmariadbmysqlenterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationn/a
CVE-2013-5803
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.6||LOW
EPSS-2.85% / 85.70%
||
7 Day CHG~0.00%
Published-16 Oct, 2013 | 17:31
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)Oracle Corporation
Product-jrockitjrejdkn/a
CVE-2013-5908
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.6||LOW
EPSS-5.87% / 90.22%
||
7 Day CHG~0.00%
Published-15 Jan, 2014 | 01:33
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.

Action-Not Available
Vendor-n/aMariaDB FoundationRed Hat, Inc.Debian GNU/LinuxOracle CorporationCanonical Ltd.
Product-enterprise_linux_serverenterprise_linux_server_ausenterprise_linux_eusmariadbmysqlubuntu_linuxenterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationdebian_linuxn/a
CVE-2012-2947
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-4.30% / 88.42%
||
7 Day CHG~0.00%
Published-02 Jun, 2012 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.

Action-Not Available
Vendor-n/aDebian GNU/LinuxDigium, Inc.
Product-debian_linuxasteriskcertified_asteriskn/a
CWE ID-CWE-284
Improper Access Control
CVE-2017-10345
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-3.1||LOW
EPSS-0.53% / 66.02%
||
7 Day CHG~0.00%
Published-19 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Oracle CorporationNetApp, Inc.
Product-enterprise_linux_desktoponcommand_unified_manageroncommand_balanceplug-in_for_symantec_netbackupenterprise_linux_server_tusenterprise_linux_eusenterprise_linux_workstatione-series_santricity_web_servicesjdke-series_santricity_management_plug-insactive_iq_unified_managersatellitesteelstore_cloud_integrated_storagedebian_linuxenterprise_linux_servercloud_backupenterprise_linux_server_ausoncommand_insightvasa_provider_for_clustered_data_ontapjreoncommand_performance_managerelement_softwaresnapmanagervirtual_storage_consoleoncommand_shifte-series_santricity_storage_manageroncommand_workflow_automationstorage_replication_adapter_for_clustered_data_ontapjrockite-series_santricity_os_controllerJava
CVE-2012-1693
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.6||LOW
EPSS-0.92% / 75.06%
||
7 Day CHG~0.00%
Published-03 May, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle SPARC Enterprise M Series Servers XCP 1110 allows remote attackers to affect availability, related to XSCF Control Package (XCP).

Action-Not Available
Vendor-n/aOracle Corporation
Product-sparc_enterprise_m9000_serversparc_enterprise_m8000_serverxcpsparc_enterprise_m5000_serversparc_enterprise_m3000_serversparc_enterprise_m4000_servern/a
CVE-2022-24130
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 30.12%
||
7 Day CHG-0.02%
Published-31 Jan, 2022 | 05:01
Updated-03 Aug, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

Action-Not Available
Vendor-invisible-islandn/aDebian GNU/LinuxFedora Project
Product-debian_linuxfedoraxtermn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-7317
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.36% / 57.62%
||
7 Day CHG~0.00%
Published-04 Feb, 2019 | 07:00
Updated-21 Oct, 2024 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.

Action-Not Available
Vendor-libpngn/aCanonical Ltd.Hewlett Packard Enterprise (HPE)Oracle CorporationRed Hat, Inc.Debian GNU/LinuxopenSUSESUSEMozilla CorporationHP Inc.NetApp, Inc.
Product-ubuntu_linuxthunderbirdfirefoxcloud_backuplibpngenterprise_linux_for_scientific_computinge-series_santricity_unified_managerenterprise_linux_workstationsteelstorepackage_hubenterprise_linux_desktopleaponcommand_insightxp7_command_viewenterprise_linuxactive_iq_unified_managersatellitejdkoncommand_workflow_automationxp7_command_view_advanced_edition_suitedebian_linuxplug-in_for_symantec_netbackupsnapmanagerlinux_enterprisejava_see-series_santricity_storage_managere-series_santricity_managemententerprise_linux_for_ibm_z_systemse-series_santricity_web_serviceshyperion_infrastructure_technologyenterprise_linux_for_power_little_endianmysqlenterprise_linux_for_power_big_endiann/a
CWE ID-CWE-416
Use After Free
CVE-2019-2945
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-3.1||LOW
EPSS-0.27% / 50.22%
||
7 Day CHG+0.01%
Published-16 Oct, 2019 | 17:40
Updated-01 Oct, 2024 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Red Hat, Inc.openSUSEOracle CorporationNetApp, Inc.Canonical Ltd.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxenterprise_linux_server_ausenterprise_linuxsatellitejdke-series_santricity_web_services_proxyoncommand_workflow_automationdebian_linuxe-series_santricity_unified_managersnapmanagerjreenterprise_linux_workstatione-series_santricity_os_controllere-series_santricity_storage_managerenterprise_linux_eusenterprise_linux_server_tusenterprise_linux_desktopleapJava
CVE-2019-2449
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-3.1||LOW
EPSS-3.46% / 87.06%
||
7 Day CHG~0.00%
Published-16 Jan, 2019 | 19:00
Updated-02 Oct, 2024 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Red Hat, Inc.NetApp, Inc.Oracle Corporation
Product-enterprise_linux_serversnapmanagerjreenterprise_linux_workstationenterprise_linuxenterprise_linux_eussatellitejdkoncommand_workflow_automationoncommand_unified_managerenterprise_linux_desktopJava
CVE-2021-34558
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.47% / 80.15%
||
7 Day CHG+0.56%
Published-15 Jul, 2021 | 13:47
Updated-04 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.

Action-Not Available
Vendor-n/aOracle CorporationNetApp, Inc.Fedora ProjectGo
Product-fedoragocloud_insights_telegraftridenttimesten_in-memory_databasestoragegridn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-14907
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-5.04% / 89.35%
||
7 Day CHG~0.00%
Published-21 Jan, 2020 | 00:00
Updated-14 Jan, 2025 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxSambaFedora ProjectSynology, Inc.Red Hat, Inc.
Product-storagedebian_linuxenterprise_linuxdiskstation_managerdirectory_serverubuntu_linuxrouter_managerskynassambafedorasamba
CWE ID-CWE-125
Out-of-bounds Read
Details not found