Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-1055

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-27 Feb, 2008 | 19:00
Updated At-07 Aug, 2024 | 08:08
Rejected At-
Credits

Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:27 Feb, 2008 | 19:00
Updated At:07 Aug, 2024 | 08:08
Rejected At:
▼CVE Numbering Authority (CNA)

Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://securityreason.com/securityalert/3705
third-party-advisory
x_refsource_SREASON
http://aluigi.altervista.org/adv/surgemailz-adv.txt
x_refsource_MISC
http://secunia.com/advisories/29137
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/29105
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0678
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1019500
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/488741/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/40833
vdb-entry
x_refsource_XF
http://www.securityfocus.com/bid/27990
vdb-entry
x_refsource_BID
Hyperlink: http://securityreason.com/securityalert/3705
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://aluigi.altervista.org/adv/surgemailz-adv.txt
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/29137
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/29105
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/0678
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1019500
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/archive/1/488741/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/40833
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.securityfocus.com/bid/27990
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://securityreason.com/securityalert/3705
third-party-advisory
x_refsource_SREASON
x_transferred
http://aluigi.altervista.org/adv/surgemailz-adv.txt
x_refsource_MISC
x_transferred
http://secunia.com/advisories/29137
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/29105
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/0678
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1019500
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/archive/1/488741/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/40833
vdb-entry
x_refsource_XF
x_transferred
http://www.securityfocus.com/bid/27990
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://securityreason.com/securityalert/3705
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://aluigi.altervista.org/adv/surgemailz-adv.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/29137
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/29105
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0678
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1019500
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/488741/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/40833
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.securityfocus.com/bid/27990
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:27 Feb, 2008 | 19:44
Updated At:11 Oct, 2018 | 20:29

Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

netwin
netwin
>>surgemail>>Versions up to 38k4(inclusive)
cpe:2.3:a:netwin:surgemail:*:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8a
cpe:2.3:a:netwin:surgemail:1.8a:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8b3
cpe:2.3:a:netwin:surgemail:1.8b3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8d
cpe:2.3:a:netwin:surgemail:1.8d:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8e
cpe:2.3:a:netwin:surgemail:1.8e:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8g3
cpe:2.3:a:netwin:surgemail:1.8g3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.9
cpe:2.3:a:netwin:surgemail:1.9:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.9b2
cpe:2.3:a:netwin:surgemail:1.9b2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.0a2
cpe:2.3:a:netwin:surgemail:2.0a2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.0c
cpe:2.3:a:netwin:surgemail:2.0c:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.0e
cpe:2.3:a:netwin:surgemail:2.0e:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.0g2
cpe:2.3:a:netwin:surgemail:2.0g2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.1a
cpe:2.3:a:netwin:surgemail:2.1a:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.1c7
cpe:2.3:a:netwin:surgemail:2.1c7:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2a6
cpe:2.3:a:netwin:surgemail:2.2a6:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2c9
cpe:2.3:a:netwin:surgemail:2.2c9:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2c10
cpe:2.3:a:netwin:surgemail:2.2c10:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2g2
cpe:2.3:a:netwin:surgemail:2.2g2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2g3
cpe:2.3:a:netwin:surgemail:2.2g3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.0a
cpe:2.3:a:netwin:surgemail:3.0a:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.0c2
cpe:2.3:a:netwin:surgemail:3.0c2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.8f3
cpe:2.3:a:netwin:surgemail:3.8f3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>39a
cpe:2.3:a:netwin:surgemail:39a:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>beta_39a
cpe:2.3:a:netwin:surgemail:beta_39a:*:*:*:*:*:*:*
netwin
netwin
>>webmail>>Versions up to 3.1s(inclusive)
cpe:2.3:a:netwin:webmail:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-134Primarynvd@nist.gov
CWE ID: CWE-134
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://aluigi.altervista.org/adv/surgemailz-adv.txtcve@mitre.org
N/A
http://secunia.com/advisories/29105cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29137cve@mitre.org
N/A
http://securityreason.com/securityalert/3705cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/488741/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/27990cve@mitre.org
Exploit
http://www.securitytracker.com/id?1019500cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/0678cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/40833cve@mitre.org
N/A
Hyperlink: http://aluigi.altervista.org/adv/surgemailz-adv.txt
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/29105
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/29137
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/3705
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/488741/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/27990
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.securitytracker.com/id?1019500
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/0678
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/40833
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

65Records found

CVE-2015-7271
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.84% / 73.77%
||
7 Day CHG~0.00%
Published-10 Apr, 2017 | 03:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Integrated Remote Access Controller (iDRAC) 7/8 before 2.21.21.21 has a format string issue in racadm getsystinfo.

Action-Not Available
Vendor-n/aDell Inc.
Product-integrated_remote_access_controller_7integrated_remote_access_controller_8integrated_remote_access_controller_firmwareDell Integrated Remote Access Controller (iDRAC)
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2014-9157
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.90% / 82.47%
||
7 Day CHG~0.00%
Published-03 Dec, 2014 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.

Action-Not Available
Vendor-graphvizn/aDebian GNU/Linux
Product-debian_linuxgraphvizn/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2022-27177
Matching Score-4
Assigner-Netflix, Inc.
ShareView Details
Matching Score-4
Assigner-Netflix, Inc.
CVSS Score-9.8||CRITICAL
EPSS-2.14% / 83.49%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-03 Aug, 2024 | 05:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2

Action-Not Available
Vendor-netflixn/a
Product-consolemeConsoleMe
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2020-13160
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-77.94% / 98.97%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 16:36
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution.

Action-Not Available
Vendor-anydeskn/aLinux Kernel Organization, IncFreeBSD Foundation
Product-freebsdanydesklinux_kerneln/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2022-26674
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-4.55% / 88.74%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 06:50
Updated-16 Sep, 2024 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASUS RT-AX88U - Format String

ASUS RT-AX88U has a Format String vulnerability, which allows an unauthenticated remote attacker to write to arbitrary memory address and perform remote arbitrary code execution, arbitrary system operation or disrupt service.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-rt-ax88u_firmwarert-ax88uRT-AX88U
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2018-1352
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.50% / 65.10%
||
7 Day CHG~0.00%
Published-08 Feb, 2019 | 18:00
Updated-25 Oct, 2024 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A format string vulnerability in Fortinet FortiOS 5.6.0 allows attacker to execute unauthorized code or commands via the SSH username variable.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-fortiosn/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2007-5265
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-11.63% / 93.39%
||
7 Day CHG~0.00%
Published-08 Oct, 2007 | 21:00
Updated-07 Aug, 2024 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple format string vulnerabilities in websrv.cpp in Dawn of Time 1.69s beta4 and earlier allow remote attackers to execute arbitrary code via format string specifiers in the (1) username or (2) password fields when accessing certain "restricted zones", which are not properly handled by the (a) processWebHeader and (b) filterWebRequest functions.

Action-Not Available
Vendor-dawnoftimen/a
Product-dawn_of_timen/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2007-5262
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.88% / 87.78%
||
7 Day CHG~0.00%
Published-08 Oct, 2007 | 21:00
Updated-07 Aug, 2024 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple format string vulnerabilities in Battlefront Dropteam 1.3.3 and earlier allow remote attackers to execute arbitrary code via format string specifiers in the (1) username, (2) password, and (3) nickname fields in a "0x01" packet.

Action-Not Available
Vendor-battlefrontn/a
Product-dropteamn/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2007-5545
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.98% / 82.83%
||
7 Day CHG~0.00%
Published-18 Oct, 2007 | 20:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in TIBCO SmartPGM FX allows remote attackers to execute arbitrary code via format string specifiers in unspecified vectors. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.

Action-Not Available
Vendor-n/aTIBCO (Cloud Software Group, Inc.)
Product-smart_pgm_fxn/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2007-5825
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.46% / 88.65%
||
7 Day CHG~0.00%
Published-05 Nov, 2007 | 19:00
Updated-07 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in the ws_addarg function in webserver.c in mt-dappd in Firefly Media Server 0.2.4 and earlier allows remote attackers to execute arbitrary code via a stats method action to /xml-rpc with format string specifiers in the (1) username or (2) password portion of base64-encoded data on the "Authorization: Basic" HTTP header line.

Action-Not Available
Vendor-fireflyn/a
Product-media_servern/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2012-2369
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-2.39% / 84.41%
||
7 Day CHG~0.00%
Published-23 May, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in the log_message_cb function in otr-plugin.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 3.2.1 for Pidgin might allow remote attackers to execute arbitrary code via format string specifiers in data that generates a log message.

Action-Not Available
Vendor-cypherpunksn/aPidgin
Product-pidgin-otrpidginn/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2011-4357
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-2.57% / 84.95%
||
7 Day CHG~0.00%
Published-10 Dec, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in the p_cgi_error function in python/neo_cgi.c in the Python CGI Kit (neo_cgi) module for Clearsilver 0.10.5 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers that are not properly handled when creating CGI error messages using the cgi_error API function.

Action-Not Available
Vendor-brandon_longn/a
Product-clearsilvern/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2019-6840
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-9.8||CRITICAL
EPSS-0.50% / 65.10%
||
7 Day CHG~0.00%
Published-17 Sep, 2019 | 19:19
Updated-04 Aug, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Format String: CWE-134 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow an attacker to send a crafted message to the target server, thereby causing arbitrary commands to be executed.

Action-Not Available
Vendor-
Product-meg6260-0415_firmwaremeg6260-0410meg6501-0002meg6501-0001_firmwaremeg6260-0410_firmwaremeg6501-0001meg6260-0415meg6501-0002_firmwareU.motion Server
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2021-41193
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.55% / 80.66%
||
7 Day CHG~0.00%
Published-01 Mar, 2022 | 18:25
Updated-23 Apr, 2025 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Externally-Controlled Format String in wire-avs

wire-avs is the audio visual signaling (AVS) component of Wire, an open-source messenger. A remote format string vulnerability in versions prior to 7.1.12 allows an attacker to cause a denial of service or possibly execute arbitrary code. The issue has been fixed in wire-avs 7.1.12. There are currently no known workarounds.

Action-Not Available
Vendor-wirewireapp
Product-wire-audio_video_signalingwire-avs
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2006-0150
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-10.29% / 92.87%
||
7 Day CHG~0.00%
Published-09 Jan, 2006 | 23:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple format string vulnerabilities in the auth_ldap_log_reason function in Apache auth_ldap 1.6.0 and earlier allows remote attackers to execute arbitrary code via various vectors, including the username.

Action-Not Available
Vendor-dave_carrigann/a
Product-auth_ldapn/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
  • Previous
  • 1
  • 2
  • Next
Details not found