Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-1949

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-21 May, 2008 | 10:00
Updated At-07 Aug, 2024 | 08:41
Rejected At-
Credits

The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:21 May, 2008 | 10:00
Updated At:07 Aug, 2024 | 08:41
Rejected At:
â–¼CVE Numbering Authority (CNA)

The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/30331
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/31939
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-613-1
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
vendor-advisory
x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2008-0492.html
vendor-advisory
x_refsource_REDHAT
http://www.openwall.com/lists/oss-security/2008/05/20/1
mailing-list
x_refsource_MLIST
http://security.gentoo.org/glsa/glsa-200805-20.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/30355
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30317
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/492282/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2008-0489.html
vendor-advisory
x_refsource_REDHAT
http://www.securityfocus.com/archive/1/492464/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
mailing-list
x_refsource_MLIST
http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
x_refsource_CONFIRM
http://secunia.com/advisories/30324
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30302
third-party-advisory
x_refsource_SECUNIA
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
mailing-list
x_refsource_MLIST
http://www.vupen.com/english/advisories/2008/1583/references
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/bid/29292
vdb-entry
x_refsource_BID
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/30330
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1582/references
vdb-entry
x_refsource_VUPEN
http://www.openwall.com/lists/oss-security/2008/05/20/3
mailing-list
x_refsource_MLIST
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
x_refsource_CONFIRM
http://secunia.com/advisories/30338
third-party-advisory
x_refsource_SECUNIA
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
mailing-list
x_refsource_MLIST
http://www.debian.org/security/2008/dsa-1581
vendor-advisory
x_refsource_DEBIAN
http://www.openwall.com/lists/oss-security/2008/05/20/2
mailing-list
x_refsource_MLIST
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
vendor-advisory
x_refsource_FEDORA
http://securityreason.com/securityalert/3902
third-party-advisory
x_refsource_SREASON
https://issues.rpath.com/browse/RPL-2552
x_refsource_CONFIRM
http://secunia.com/advisories/30287
third-party-advisory
x_refsource_SECUNIA
http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
x_refsource_CONFIRM
http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/42530
vdb-entry
x_refsource_XF
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
vendor-advisory
x_refsource_FEDORA
http://www.securitytracker.com/id?1020058
vdb-entry
x_refsource_SECTRACK
http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
vendor-advisory
x_refsource_MANDRIVA
http://www.kb.cert.org/vuls/id/252626
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://secunia.com/advisories/30331
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/31939
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-613-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0492.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/1
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://security.gentoo.org/glsa/glsa-200805-20.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/30355
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30317
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/492282/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0489.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securityfocus.com/archive/1/492464/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30324
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30302
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.vupen.com/english/advisories/2008/1583/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/bid/29292
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/30330
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/1582/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/3
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30338
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.debian.org/security/2008/dsa-1581
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://securityreason.com/securityalert/3902
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: https://issues.rpath.com/browse/RPL-2552
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30287
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42530
Resource:
vdb-entry
x_refsource_XF
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.securitytracker.com/id?1020058
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.kb.cert.org/vuls/id/252626
Resource:
third-party-advisory
x_refsource_CERT-VN
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/30331
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/31939
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-613-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0492.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/20/1
mailing-list
x_refsource_MLIST
x_transferred
http://security.gentoo.org/glsa/glsa-200805-20.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/30355
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30317
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/492282/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0489.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securityfocus.com/archive/1/492464/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
mailing-list
x_refsource_MLIST
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30324
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30302
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
mailing-list
x_refsource_MLIST
x_transferred
http://www.vupen.com/english/advisories/2008/1583/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/bid/29292
vdb-entry
x_refsource_BID
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/30330
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/1582/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/20/3
mailing-list
x_refsource_MLIST
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30338
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
mailing-list
x_refsource_MLIST
x_transferred
http://www.debian.org/security/2008/dsa-1581
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/20/2
mailing-list
x_refsource_MLIST
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://securityreason.com/securityalert/3902
third-party-advisory
x_refsource_SREASON
x_transferred
https://issues.rpath.com/browse/RPL-2552
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30287
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
x_refsource_CONFIRM
x_transferred
http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/42530
vdb-entry
x_refsource_XF
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.securitytracker.com/id?1020058
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.kb.cert.org/vuls/id/252626
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://secunia.com/advisories/30331
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/31939
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-613-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0492.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/1
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200805-20.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/30355
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30317
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/492282/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0489.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/492464/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30324
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30302
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1583/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/29292
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/30330
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1582/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/3
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30338
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1581
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://securityreason.com/securityalert/3902
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-2552
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30287
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42530
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020058
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/252626
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:21 May, 2008 | 13:24
Updated At:23 Apr, 2026 | 00:35

The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

GNU
gnu
>>gnutls>>1.0.18
cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.19
cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.20
cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.21
cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.22
cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.23
cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.24
cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.0.25
cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.13
cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.14
cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.15
cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.16
cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.17
cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.18
cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.19
cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.20
cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.21
cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.22
cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.1.23
cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.0
cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.1
cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.2
cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.3
cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.4
cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.5
cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.6
cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.7
cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.8
cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.9
cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.10
cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.2.11
cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.0
cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.1
cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.2
cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.3
cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.4
cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.3.5
cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.0
cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.1
cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.2
cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.3
cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.4
cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.4.5
cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.0
cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.1
cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.2
cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.3
cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.4
cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.5.5
cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*
GNU
gnu
>>gnutls>>1.6.0
cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97bsecalert@redhat.com
N/A
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.htmlsecalert@redhat.com
N/A
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.htmlsecalert@redhat.com
N/A
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/30287secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30302secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30317secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30324secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30330secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30331secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30338secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30355secalert@redhat.com
N/A
http://secunia.com/advisories/31939secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200805-20.xmlsecalert@redhat.com
N/A
http://securityreason.com/securityalert/3902secalert@redhat.com
N/A
http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558secalert@redhat.com
N/A
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174secalert@redhat.com
N/A
http://www.cert.fi/haavoittuvuudet/advisory-gnutls.htmlsecalert@redhat.com
Exploit
http://www.debian.org/security/2008/dsa-1581secalert@redhat.com
N/A
http://www.kb.cert.org/vuls/id/252626secalert@redhat.com
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:106secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2008/05/20/1secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2008/05/20/2secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2008/05/20/3secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0489.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0492.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/492282/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/492464/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/29292secalert@redhat.com
Patch
http://www.securitytracker.com/id?1020058secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-613-1secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/1582/referencessecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/1583/referencessecalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/42530secalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-2552secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519secalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.htmlsecalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.htmlsecalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.htmlsecalert@redhat.com
N/A
http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97baf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/30287af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30302af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30317af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30324af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30330af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30331af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30338af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30355af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/31939af854a3a-2127-422b-91ae-364da2661108
N/A
http://security.gentoo.org/glsa/glsa-200805-20.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://securityreason.com/securityalert/3902af854a3a-2127-422b-91ae-364da2661108
N/A
http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558af854a3a-2127-422b-91ae-364da2661108
N/A
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.cert.fi/haavoittuvuudet/advisory-gnutls.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.debian.org/security/2008/dsa-1581af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.kb.cert.org/vuls/id/252626af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:106af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2008/05/20/1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2008/05/20/2af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2008/05/20/3af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2008-0489.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2008-0492.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/492282/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/492464/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/29292af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securitytracker.com/id?1020058af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/usn-613-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2008/1582/referencesaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2008/1583/referencesaf854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/42530af854a3a-2127-422b-91ae-364da2661108
N/A
https://issues.rpath.com/browse/RPL-2552af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30287
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30302
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30317
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30324
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30330
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30331
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30338
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30355
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/31939
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200805-20.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/3902
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
Source: secalert@redhat.com
Resource:
Exploit
Hyperlink: http://www.debian.org/security/2008/dsa-1581
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/252626
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/3
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0489.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0492.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/492282/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/492464/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/29292
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.securitytracker.com/id?1020058
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-613-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1582/references
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1583/references
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42530
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-2552
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commitdiff%3Bh=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/30287
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30302
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30317
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30324
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30330
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30331
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30338
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30355
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/31939
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200805-20.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/3902
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=600646&group_id=21558
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.debian.org/security/2008/dsa-1581
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/252626
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:106
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/20/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0489.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0492.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/492282/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/492464/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/29292
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.securitytracker.com/id?1020058
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-613-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1582/references
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1583/references
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42530
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-2552
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

73Records found

CVE-2017-16997
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.8||HIGH
EPSS-1.13% / 78.44%
||
7 Day CHG+0.26%
Published-18 Dec, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

Action-Not Available
Vendor-n/aRed Hat, Inc.GNU
Product-enterprise_linux_desktopglibcenterprise_linux_serverenterprise_linux_workstationglibc 2.19 through 2.26
CWE ID-CWE-426
Untrusted Search Path
CVE-2017-13089
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-75.77% / 98.92%
||
7 Day CHG~0.00%
Published-27 Oct, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GNU Wget: stack overflow in HTTP protocol handling

The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument.

Action-Not Available
Vendor-GNU ProjectDebian GNU/LinuxGNU
Product-wgetdebian_linuxWget
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2017-13090
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-8.55% / 92.43%
||
7 Day CHG~0.00%
Published-27 Oct, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GNU Wget: heap overflow in HTTP protocol handling

The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.

Action-Not Available
Vendor-GNU ProjectDebian GNU/LinuxGNU
Product-wgetdebian_linuxWget
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2012-0035
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-4.03% / 88.53%
||
7 Day CHG~0.00%
Published-19 Jan, 2012 | 15:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

Action-Not Available
Vendor-eric_m_ludlamn/aGNU
Product-emacscedetn/a
CVE-2008-3916
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-4.67% / 89.37%
||
7 Day CHG~0.00%
Published-04 Sep, 2008 | 18:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

Action-Not Available
Vendor-n/aGNU
Product-edn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-13638
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.09% / 84.11%
||
7 Day CHG~0.00%
Published-26 Jul, 2019 | 12:22
Updated-04 Aug, 2024 | 23:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGNU
Product-patchdebian_linuxn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-20969
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.35% / 57.66%
||
7 Day CHG~0.00%
Published-16 Aug, 2019 | 03:36
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

Action-Not Available
Vendor-n/aGNU
Product-patchn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2014-4877
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-9.3||HIGH
EPSS-74.31% / 98.86%
||
7 Day CHG~0.00%
Published-29 Oct, 2014 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

Action-Not Available
Vendor-n/aGNU
Product-wgetn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-43414
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.03% / 7.92%
||
7 Day CHG~0.00%
Published-07 Nov, 2021 | 17:06
Updated-04 Aug, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in GNU Hurd before 0.9 20210404-9. The use of an authentication protocol in the proc server is vulnerable to man-in-the-middle attacks, which can be exploited for local privilege escalation to get full root access.

Action-Not Available
Vendor-n/aGNU
Product-hurdn/a
CWE ID-CWE-287
Improper Authentication
CVE-2009-1390
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.43% / 62.96%
||
7 Day CHG~0.00%
Published-16 Jun, 2009 | 20:26
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack.

Action-Not Available
Vendor-muttn/aOpenSSLGNU
Product-muttgnutlsopenssln/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-6130
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.37% / 58.98%
||
7 Day CHG~0.00%
Published-26 Nov, 2007 | 22:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gnump3d 2.9final does not apply password protection to its plugins, which might allow remote attackers to bypass intended access restrictions.

Action-Not Available
Vendor-n/aGNU
Product-gnump3dn/a
CWE ID-CWE-287
Improper Authentication
CVE-2009-4128
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.04% / 11.70%
||
7 Day CHG~0.00%
Published-01 Dec, 2009 | 00:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU GRand Unified Bootloader (GRUB) 2 1.97 only compares the submitted portion of a password with the actual password, which makes it easier for physically proximate attackers to conduct brute force attacks and bypass authentication by submitting a password whose length is 1.

Action-Not Available
Vendor-n/aGNU
Product-grub_2n/a
CWE ID-CWE-287
Improper Authentication
CVE-2008-1259
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.27% / 50.60%
||
7 Day CHG~0.00%
Published-10 Mar, 2008 | 17:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a user who previously authenticated within the previous 5 minutes.

Action-Not Available
Vendor-n/aZyxel Networks Corporation
Product-p-2602hw-d1an/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-4203
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.86% / 75.11%
||
7 Day CHG~0.00%
Published-08 Aug, 2007 | 01:11
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Session fixation vulnerability in Mambo 4.6.2 CMS allows remote attackers to hijack web sessions by setting the Cookie parameter.

Action-Not Available
Vendor-n/aMamboServer
Product-mambo_open_sourcen/a
CWE ID-CWE-287
Improper Authentication
CVE-2013-0935
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.3||HIGH
EPSS-1.79% / 82.86%
||
7 Day CHG~0.00%
Published-28 Mar, 2013 | 15:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EMC Smarts Network Configuration Manager (NCM) before 9.2 does not require authentication for all Java RMI method calls, which allows remote attackers to execute arbitrary code via unspecified vectors.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-smarts_network_configuration_managern/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-29165
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-10||CRITICAL
EPSS-1.58% / 81.66%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 14:15
Updated-23 Apr, 2025 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Argo CD will blindly trust JWT claims if anonymous access is enabled

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. A critical vulnerability has been discovered in Argo CD starting with version 1.4.0 and prior to versions 2.1.15, 2.2.9, and 2.3.4 which would allow unauthenticated users to impersonate as any Argo CD user or role, including the `admin` user, by sending a specifically crafted JSON Web Token (JWT) along with the request. In order for this vulnerability to be exploited, anonymous access to the Argo CD instance must have been enabled. In a default Argo CD installation, anonymous access is disabled. The vulnerability can be exploited to impersonate as any user or role, including the built-in `admin` account regardless of whether it is enabled or disabled. Also, the attacker does not need an account on the Argo CD instance in order to exploit this. If anonymous access to the instance is enabled, an attacker can escalate their privileges, effectively allowing them to gain the same privileges on the cluster as the Argo CD instance, which is cluster admin in a default installation. This will allow the attacker to create, manipulate and delete any resource on the cluster. They may also exfiltrate data by deploying malicious workloads with elevated privileges, thus bypassing any redaction of sensitive data otherwise enforced by the Argo CD API. A patch for this vulnerability has been released in Argo CD versions 2.3.4, 2.2.9, and 2.1.15. As a workaround, one may disable anonymous access, but upgrading to a patched version is preferable.

Action-Not Available
Vendor-argoprojargoproj
Product-argo_cdargo-cd
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2008-4037
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-75.53% / 98.91%
||
7 Day CHG~0.00%
Published-12 Nov, 2008 | 23:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windowswindows_vistawindows_2000windows_server_2008n/a
CWE ID-CWE-287
Improper Authentication
CVE-2001-0537
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-93.77% / 99.86%
||
7 Day CHG~0.00%
Published-09 Mar, 2002 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-13804
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.1||HIGH
EPSS-3.38% / 87.44%
||
7 Day CHG~0.00%
Published-13 Dec, 2018 | 16:00
Updated-05 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (Versions V7.1 < V7.1 Upd3), SIMATIC IT UA Discrete Manufacturing (Versions < V1.2), SIMATIC IT UA Discrete Manufacturing (Versions V1.2), SIMATIC IT UA Discrete Manufacturing (Versions V1.3), SIMATIC IT UA Discrete Manufacturing (Versions V2.3), SIMATIC IT UA Discrete Manufacturing (Versions V2.4). An attacker with network access to the installation could bypass the application-level authentication. In order to exploit the vulnerability, an attacker must obtain network access to an affected installation and must obtain a valid username to the system. Successful exploitation requires no user privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-simatic_it_production_suitesimatic_it_line_monitoring_systemsimatic_it_ua_discrete_manufacturingSIMATIC IT LMS, SIMATIC IT Production Suite, SIMATIC IT UA Discrete Manufacturing, SIMATIC IT UA Discrete Manufacturing, SIMATIC IT UA Discrete Manufacturing, SIMATIC IT UA Discrete Manufacturing, SIMATIC IT UA Discrete Manufacturing
CWE ID-CWE-287
Improper Authentication
CVE-2018-12455
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-11.24% / 93.55%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 21:00
Updated-05 Aug, 2024 | 08:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Intelbras NPLUG 1.0.0.14 wireless repeater devices have a critical vulnerability that allows an attacker to authenticate in the web interface just by using "admin:" as the name of a cookie.

Action-Not Available
Vendor-intelbrasn/a
Product-nplugnplug_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-5554
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.58% / 81.67%
||
7 Day CHG~0.00%
Published-23 Jan, 2017 | 06:49
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ABOOT in OnePlus 3 and 3T OxygenOS before 4.0.2. The attacker can reboot the device into the fastboot mode, which could be done without any authentication. A physical attacker can press the "Volume Up" button during device boot, where an attacker with ADB access can issue the adb reboot bootloader command. Then, the attacker can put the platform's SELinux in permissive mode, which severely weakens it, by issuing: fastboot oem selinux permissive.

Action-Not Available
Vendor-oneplusn/a
Product-oxygenosoneplus_3oneplus_3tn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-20695
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-10||CRITICAL
EPSS-2.65% / 85.84%
||
7 Day CHG~0.00%
Published-15 Apr, 2022 | 14:15
Updated-06 Nov, 2024 | 16:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Wireless LAN Controller Management Interface Authentication Bypass Vulnerability

A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to bypass authentication controls and log in to the device through the management interface This vulnerability is due to the improper implementation of the password validation algorithm. An attacker could exploit this vulnerability by logging in to an affected device with crafted credentials. A successful exploit could allow the attacker to bypass authentication and log in to the device as an administrator. The attacker could obtain privileges that are the same level as an administrative user but it depends on the crafted credentials. Note: This vulnerability exists because of a non-default device configuration that must be present for it to be exploitable. For details about the vulnerable configuration, see the Vulnerable Products section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-aironet_1562iaironet_1830evirtual_wireless_controlleraironet_1850eaironet_1560aironet_3800eaironet_1815t5520_wireless_controlleraironet_1850aironet_1562eaironet_2800iaironet_1542iaironet_3800paironet_1830aironet_1830iaironet_1815aironet_15408540_wireless_controlleraironet_1832aironet_1815iaironet_1815waironet_4800aironet_2800aironet_1542daironet_3800wireless_lan_controller_8.10.151.0aironet_1562daironet_18523504_wireless_controlleraironet_3800iwireless_lan_controller_8.10.162.0aironet_1850iaironet_1815maironet_2800eCisco Wireless LAN Controller (WLC)
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-287
Improper Authentication
CVE-2017-2332
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-8.8||HIGH
EPSS-1.09% / 78.02%
||
7 Day CHG~0.00%
Published-24 Apr, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insufficient authentication vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow a malicious, network based, unauthenticated attacker to perform privileged actions to gain complete control over the environment.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-northstar_controllerNorthStar Controller Application
CWE ID-CWE-287
Improper Authentication
CVE-2020-2018
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-9||CRITICAL
EPSS-0.32% / 54.92%
||
7 Day CHG~0.00%
Published-13 May, 2020 | 19:07
Updated-16 Sep, 2024 | 23:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PAN-OS: Panorama authentication bypass vulnerability

An authentication bypass vulnerability in the Panorama context switching feature allows an attacker with network access to a Panorama's management interface to gain privileged access to managed firewalls. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue does not affect Panorama configured with custom certificates authentication for communication between Panorama and managed devices. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.12; PAN-OS 9.0 versions earlier than 9.0.6; All versions of PAN-OS 8.0.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-pan-osPAN-OS
CWE ID-CWE-287
Improper Authentication
CVE-2017-18641
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.35% / 57.05%
||
7 Day CHG~0.00%
Published-10 Feb, 2020 | 00:30
Updated-05 Aug, 2024 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In LXC 2.0, many template scripts download code over cleartext HTTP, and omit a digital-signature check, before running it to bootstrap containers.

Action-Not Available
Vendor-linuxcontainersn/a
Product-lxcn/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-13872
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-8.1||HIGH
EPSS-76.66% / 98.96%
||
7 Day CHG~0.00%
Published-29 Nov, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Apple products. macOS High Sierra before Security Update 2017-001 is affected. The issue involves the "Directory Utility" component. It allows attackers to obtain administrator access without a password via certain interactions involving entry of the root user name.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xmacOS High Sierra
CWE ID-CWE-287
Improper Authentication
CVE-2017-10784
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.60% / 81.80%
||
7 Day CHG~0.00%
Published-19 Sep, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-6440
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||HIGH
EPSS-1.17% / 78.75%
||
7 Day CHG~0.00%
Published-24 Jan, 2013 | 21:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix PLC Improper Input Validation

The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product’s Web server to view and alter product configuration and diagnostics information. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-compactlogix_l32e_controllersoftlogix1768-eweb1756-ewebcompactlogix1756-enbtcontrollogix_controllersmicrologixcompactlogix_controllers1768-enbtcompactlogix_l35e_controllersoftlogix_controllersflexlogix_1788-enbt_adapter1794-aentr_flex_i\/o_ethernet\/ip_adapterguardlogix_controllerscontrollogixguardlogix1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCompactLogix and SoftLogix controllers1788-ENBT FLEXLogix adapterControlLogix and GuardLogix controllersControlLogix, CompactLogix, GuardLogix, and SoftLogixCompactLogix L32E and L35E controllers1794-AENTR FLEX I/O EtherNet/IP adapterMicroLogix
CWE ID-CWE-287
Improper Authentication
CVE-2012-5975
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-25.75% / 96.28%
||
7 Day CHG~0.00%
Published-04 Dec, 2012 | 23:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.

Action-Not Available
Vendor-sshn/aLinux Kernel Organization, Inc
Product-tectia_serverlinux_kerneln/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-6066
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-75.87% / 98.93%
||
7 Day CHG~0.00%
Published-04 Dec, 2012 | 23:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.

Action-Not Available
Vendor-freesshdn/a
Product-freesshdn/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-4614
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.3||HIGH
EPSS-0.58% / 68.91%
||
7 Day CHG~0.00%
Published-27 Nov, 2012 | 21:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The default configuration of EMC Smarts Network Configuration Manager (NCM) before 9.1 does not require authentication for database access, which allows remote attackers to have an unspecified impact via a network session.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-it_operations_intelligencen/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-4508
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.3||HIGH
EPSS-0.42% / 61.85%
||
7 Day CHG~0.00%
Published-03 Feb, 2012 | 20:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime generates predictable authentication tokens for cookies, which makes it easier for remote attackers to bypass authentication via a crafted cookie.

Action-Not Available
Vendor-n/aSiemens AG
Product-simatic_hmi_panelswinccwincc_flexiblewincc_runtime_advancedwincc_flexible_runtimen/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-4644
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-4.99% / 89.74%
||
7 Day CHG~0.00%
Published-03 Jan, 2012 | 11:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.

Action-Not Available
Vendor-n/aSplunk LLC (Cisco Systems, Inc.)
Product-splunkn/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-0920
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-3.74% / 88.07%
||
7 Day CHG~0.00%
Published-08 Feb, 2011 | 21:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Remote Console in IBM Lotus Domino, when a certain unsupported configuration involving UNC share pathnames is used, allows remote attackers to bypass authentication and execute arbitrary code via unspecified vectors, aka SPR PRAD89WGRS.

Action-Not Available
Vendor-n/aIBM Corporation
Product-lotus_dominon/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-0688
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-2.04% / 83.94%
||
7 Day CHG~0.00%
Published-31 Jan, 2011 | 20:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Intel Alert Management System (aka AMS or AMS2), as used in Symantec Antivirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary commands via crafted messages over TCP, as discovered by Junaid Bohio, a different vulnerability than CVE-2010-0110 and CVE-2010-0111. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-system_centerantivirus_central_quarantine_serverantivirusn/a
CWE ID-CWE-287
Improper Authentication
CVE-2010-4573
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-1.57% / 81.64%
||
7 Day CHG~0.00%
Published-22 Dec, 2010 | 20:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Update Installer in VMware ESXi 4.1, when a modified sfcb.cfg is present, does not properly configure the SFCB authentication mode, which allows remote attackers to obtain access via an arbitrary username and password.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-esxin/a
CWE ID-CWE-287
Improper Authentication
CVE-2010-2620
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-55.67% / 98.10%
||
7 Day CHG~0.00%
Published-02 Jul, 2010 | 20:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open&Compact FTP Server (Open-FTPD) 1.2 and earlier allows remote attackers to bypass authentication by sending (1) LIST, (2) RETR, (3) STOR, or other commands without performing the required login steps first.

Action-Not Available
Vendor-open-ftpdn/a
Product-open-ftpdn/a
CWE ID-CWE-287
Improper Authentication
CVE-2010-0833
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-9.3||HIGH
EPSS-0.91% / 75.98%
||
7 Day CHG~0.00%
Published-27 Jul, 2010 | 22:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The pam_lsass library in Likewise Open 5.4 and CIFS 5.4 before build 8046, and 6.0 before build 8234, as used in HP StorageWorks X9000 Network Storage Systems and possibly other products, uses "SetPassword logic" when running as part of a root service, which allows remote attackers to bypass authentication for a Likewise Security Authority (lsassd) account whose password is marked as expired.

Action-Not Available
Vendor-likewisen/a
Product-likewise_openlikewise_cifsn/a
CWE ID-CWE-287
Improper Authentication
CVE-2009-3232
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.54% / 67.64%
||
7 Day CHG~0.00%
Published-17 Sep, 2009 | 10:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an "empty selection" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-ubuntu_linuxn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-2302
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.68% / 71.64%
||
7 Day CHG~0.00%
Published-11 Jul, 2022 | 10:40
Updated-16 Sep, 2024 | 22:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LENZE: Missing password verification in authorisation procedure

Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password.

Action-Not Available
Vendor-lenzeLENZE
Product-c550c550_firmwarec520_firmwarec750_firmwarec750c520cabinet c520cabinet c750cabinet c550
CWE ID-CWE-304
Missing Critical Step in Authentication
CWE ID-CWE-287
Improper Authentication
CVE-2008-4389
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.3||HIGH
EPSS-0.57% / 68.70%
||
7 Day CHG~0.00%
Published-17 Jun, 2010 | 16:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec AppStream 5.2.x and Symantec Workspace Streaming (SWS) 6.1.x before 6.1 SP4 do not properly perform authentication, which allows remote Workspace Streaming servers and man-in-the-middle attackers to download arbitrary executable files onto a client system, and execute these files, via unspecified vectors.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-appstreamworkspace_streamingn/a
CWE ID-CWE-287
Improper Authentication
CVE-2019-2018
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.8||HIGH
EPSS-0.25% / 48.57%
||
7 Day CHG~0.00%
Published-19 Jun, 2019 | 20:01
Updated-04 Aug, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In resetPasswordInternal of DevicePolicyManagerService.java, there is a possible bypass of password reset protection due to an unusual root cause. Remote user interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9Android ID: A-110172241

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-287
Improper Authentication
CVE-2008-3033
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-1.86% / 83.16%
||
7 Day CHG~0.00%
Published-07 Jul, 2008 | 18:20
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RSS-aggregator 1.0 does not require administrative authentication for the admin/fonctions/ directory, which allows remote attackers to access admin functions and have unspecified other impact, as demonstrated by (1) an IdFlux request to supprimer_flux.php and (2) a TpsRafraich request to modifier_tps_rafraich.php.

Action-Not Available
Vendor-rss_aggregatorn/a
Product-rss_aggregatorn/a
CWE ID-CWE-287
Improper Authentication
CVE-2008-2705
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.35% / 57.41%
||
7 Day CHG~0.00%
Published-16 Jun, 2008 | 18:26
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Sun Java System Access Manager (AM) 7.1, when used with certain versions and configurations of Sun Directory Server Enterprise Edition (DSEE), allows remote attackers to bypass authentication via unspecified vectors.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-java_system_access_managern/a
CWE ID-CWE-287
Improper Authentication
CVE-2016-5686
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-3.01% / 86.64%
||
7 Day CHG~0.00%
Published-05 Oct, 2016 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Johnson & Johnson Animas OneTouch Ping devices mishandle acknowledgements, which makes it easier for remote attackers to bypass authentication via a custom communication protocol.

Action-Not Available
Vendor-animasn/a
Product-onetouch_ping_firmwareonetouch_pingn/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-34746
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-7.62% / 91.89%
||
7 Day CHG~0.00%
Published-02 Sep, 2021 | 03:05
Updated-07 Nov, 2024 | 22:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability

A vulnerability in the TACACS+ authentication, authorization and accounting (AAA) feature of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to bypass authentication and log in to an affected device as an administrator. This vulnerability is due to incomplete validation of user-supplied input that is passed to an authentication script. An attacker could exploit this vulnerability by injecting parameters into an authentication request. A successful exploit could allow the attacker to bypass authentication and log in as an administrator to the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-enterprise_nfv_infrastructure_softwareCisco Enterprise NFV Infrastructure Software
CWE ID-CWE-289
Authentication Bypass by Alternate Name
CWE ID-CWE-287
Improper Authentication
CVE-2016-5086
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-3.01% / 86.67%
||
7 Day CHG~0.00%
Published-05 Oct, 2016 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Johnson & Johnson Animas OneTouch Ping devices allow remote attackers to bypass authentication via replay attacks.

Action-Not Available
Vendor-animasn/a
Product-onetouch_ping_firmwareonetouch_pingn/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-4419
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-7.99% / 92.12%
||
7 Day CHG~0.00%
Published-18 Aug, 2007 | 21:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Admin.php in Olate Download (od) 3.4.1 uses an MD5 hash of the admin username, user id, and group id, to compose the OD3_AutoLogin authentication cookie, which makes it easier for remote attackers to guess the cookie and access the Admin area.

Action-Not Available
Vendor-olaten/a
Product-olatedownloadn/a
CWE ID-CWE-287
Improper Authentication
CVE-2010-0834
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-9.3||HIGH
EPSS-0.37% / 59.05%
||
7 Day CHG~0.00%
Published-09 Aug, 2010 | 20:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.

Action-Not Available
Vendor-n/aUbuntuDell Inc.
Product-ubuntu_linuxlatitude_2110_netbookn/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-7361
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.74% / 72.91%
||
7 Day CHG~0.00%
Published-15 Oct, 2015 | 20:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FortiOS 5.2.3, when configured to use High Availability (HA) and the dedicated management interface is enabled, does not require authentication for access to the ZebOS shell on the HA dedicated management interface, which allows remote attackers to obtain shell access via unspecified vectors.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-fortiosn/a
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • Next
Details not found