Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-3081

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-09 Jul, 2008 | 00:00
Updated At-07 Aug, 2024 | 09:21
Rejected At-
Credits

Multiple unspecified "input validation" vulnerabilities in the Web management interface (aka Messaging Administration interface) in Avaya Message Storage Server (MSS) 3.x and 4.0, and possibly Communication Manager 3.1.x, allow remote authenticated administrators to execute arbitrary commands as user vexvm via vectors related to (1) SFTP Remote Store configuration; (2) remote FTP storage settings; (3) name server lookup; (4) pinging another host; (5) TCP/IP Networking parameter configuration; (6) the external hosts configuration main page; (7) adding and changing external hosts; (8) Windows domain parameter configuration; (9) date, time, and NTP server configuration; (10) alarm settings; (11) the command line history form; (12) the maintenance form; and (13) the server events form.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:09 Jul, 2008 | 00:00
Updated At:07 Aug, 2024 | 09:21
Rejected At:
▼CVE Numbering Authority (CNA)

Multiple unspecified "input validation" vulnerabilities in the Web management interface (aka Messaging Administration interface) in Avaya Message Storage Server (MSS) 3.x and 4.0, and possibly Communication Manager 3.1.x, allow remote authenticated administrators to execute arbitrary commands as user vexvm via vectors related to (1) SFTP Remote Store configuration; (2) remote FTP storage settings; (3) name server lookup; (4) pinging another host; (5) TCP/IP Networking parameter configuration; (6) the external hosts configuration main page; (7) adding and changing external hosts; (8) Windows domain parameter configuration; (9) date, time, and NTP server configuration; (10) alarm settings; (11) the command line history form; (12) the maintenance form; and (13) the server events form.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/29938
vdb-entry
x_refsource_BID
http://www.voipshield.com/research-details.php?id=92
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=104
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=98
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/43424
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2008/1945/references
vdb-entry
x_refsource_VUPEN
http://www.voipshield.com/research-details.php?id=94
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=93
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/43422
vdb-entry
x_refsource_XF
http://www.voipshield.com/research-details.php?id=100
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=97
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=102
x_refsource_MISC
http://support.avaya.com/elmodocs2/security/ASA-2008-269.htm
x_refsource_CONFIRM
http://osvdb.org/46587
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/30777
third-party-advisory
x_refsource_SECUNIA
http://www.voipshield.com/research-details.php?id=101
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=99
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=95
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=103
x_refsource_MISC
http://www.voipshield.com/research-details.php?id=96
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/43423
vdb-entry
x_refsource_XF
Hyperlink: http://www.securityfocus.com/bid/29938
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.voipshield.com/research-details.php?id=92
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=104
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=98
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43424
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2008/1945/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.voipshield.com/research-details.php?id=94
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=93
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43422
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.voipshield.com/research-details.php?id=100
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=97
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=102
Resource:
x_refsource_MISC
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-269.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://osvdb.org/46587
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/30777
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.voipshield.com/research-details.php?id=101
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=99
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=95
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=103
Resource:
x_refsource_MISC
Hyperlink: http://www.voipshield.com/research-details.php?id=96
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43423
Resource:
vdb-entry
x_refsource_XF
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/29938
vdb-entry
x_refsource_BID
x_transferred
http://www.voipshield.com/research-details.php?id=92
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=104
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=98
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43424
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2008/1945/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.voipshield.com/research-details.php?id=94
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=93
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43422
vdb-entry
x_refsource_XF
x_transferred
http://www.voipshield.com/research-details.php?id=100
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=97
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=102
x_refsource_MISC
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2008-269.htm
x_refsource_CONFIRM
x_transferred
http://osvdb.org/46587
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/30777
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.voipshield.com/research-details.php?id=101
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=99
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=95
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=103
x_refsource_MISC
x_transferred
http://www.voipshield.com/research-details.php?id=96
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43423
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.securityfocus.com/bid/29938
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=92
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=104
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=98
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43424
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1945/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=94
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=93
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43422
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=100
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=97
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=102
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-269.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://osvdb.org/46587
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/30777
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=101
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=99
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=95
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=103
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.voipshield.com/research-details.php?id=96
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43423
Resource:
vdb-entry
x_refsource_XF
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:09 Jul, 2008 | 00:41
Updated At:08 Aug, 2017 | 01:31

Multiple unspecified "input validation" vulnerabilities in the Web management interface (aka Messaging Administration interface) in Avaya Message Storage Server (MSS) 3.x and 4.0, and possibly Communication Manager 3.1.x, allow remote authenticated administrators to execute arbitrary commands as user vexvm via vectors related to (1) SFTP Remote Store configuration; (2) remote FTP storage settings; (3) name server lookup; (4) pinging another host; (5) TCP/IP Networking parameter configuration; (6) the external hosts configuration main page; (7) adding and changing external hosts; (8) Windows domain parameter configuration; (9) date, time, and NTP server configuration; (10) alarm settings; (11) the command line history form; (12) the maintenance form; and (13) the server events form.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 6.5
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

Avaya LLC
avaya
>>messaging_storage_server>>3
cpe:2.3:a:avaya:messaging_storage_server:3:*:*:*:*:*:*:*
Avaya LLC
avaya
>>messaging_storage_server>>3.1
cpe:2.3:a:avaya:messaging_storage_server:3.1:*:*:*:*:*:*:*
Avaya LLC
avaya
>>messaging_storage_server>>4.0
cpe:2.3:a:avaya:messaging_storage_server:4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://osvdb.org/46587cve@mitre.org
N/A
http://secunia.com/advisories/30777cve@mitre.org
Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-269.htmcve@mitre.org
N/A
http://www.securityfocus.com/bid/29938cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=100cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=101cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=102cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=103cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=104cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=92cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=93cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=94cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=95cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=96cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=97cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=98cve@mitre.org
N/A
http://www.voipshield.com/research-details.php?id=99cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/1945/referencescve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/43422cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/43423cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/43424cve@mitre.org
N/A
Hyperlink: http://osvdb.org/46587
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30777
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-269.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/29938
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=100
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=101
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=102
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=103
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=104
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=92
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=93
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=94
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=95
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=96
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=97
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=98
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.voipshield.com/research-details.php?id=99
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1945/references
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43422
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43423
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43424
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

275Records found

CVE-2019-12831
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.55% / 66.96%
||
7 Day CHG~0.00%
Published-15 Jun, 2019 | 17:05
Updated-04 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In MyBB before 1.8.21, an attacker can abuse a default behavior of MySQL on many systems (that leads to truncation of strings that are too long for a database column) to create a PHP shell in the cache directory of a targeted forum via a crafted XML import, as demonstrated by truncation of aaaaaaaaaaaaaaaaaaaaaaaaaa.php.css to aaaaaaaaaaaaaaaaaaaaaaaaaa.php with a 30-character limit, aka theme import stylesheet name RCE.

Action-Not Available
Vendor-n/aMyBB
Product-mybbn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11218
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.86% / 74.20%
||
7 Day CHG~0.00%
Published-24 Apr, 2019 | 19:21
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling of extra parameters in the AccountController (User Profile edit) in Jakub Chodounsky Bonobo Git Server before 6.5.0 allows authenticated users to gain application administrator privileges via additional form parameter submissions.

Action-Not Available
Vendor-bonobogitservern/a
Product-bonobo_git_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-36025
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-9.1||CRITICAL
EPSS-5.48% / 89.83%
||
7 Day CHG~0.00%
Published-01 Sep, 2021 | 14:31
Updated-17 Sep, 2024 | 00:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Magento Commerce Customer Edition Improper Input Validation Could Lead To Remote Code Execution

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability while saving a customer's details with a specially crafted file. An authenticated attacker with admin privileges can leverage this vulnerability to achieve remote code execution.

Action-Not Available
Vendor-Adobe Inc.
Product-magento_open_sourceadobe_commerceMagento Commerce
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0957
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-8.94% / 92.25%
||
7 Day CHG~0.00%
Published-16 May, 2019 | 18:24
Updated-04 Aug, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0958.

Action-Not Available
Vendor-Microsoft Corporation
Product-sharepoint_serversharepoint_enterprise_serverMicrosoft SharePoint ServerMicrosoft SharePoint Enterprise Server
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0594
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-40.52% / 97.26%
||
7 Day CHG~0.00%
Published-06 Mar, 2019 | 00:00
Updated-04 Aug, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0604.

Action-Not Available
Vendor-Microsoft Corporation
Product-sharepoint_serversharepoint_foundationsharepoint_enterprise_serverMicrosoft SharePoint ServerMicrosoft SharePoint Enterprise ServerMicrosoft SharePoint Foundation
CWE ID-CWE-20
Improper Input Validation
CVE-2018-7832
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-8.8||HIGH
EPSS-1.28% / 78.73%
||
7 Day CHG~0.00%
Published-24 Dec, 2018 | 16:00
Updated-05 Aug, 2024 | 06:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Input Validation vulnerability exists in Pro-Face GP-Pro EX v4.08 and previous versions which could cause the execution arbitrary executable when GP-Pro EX is launched.

Action-Not Available
Vendor-
Product-pro-face_gp-pro_exPro-Face GP-Pro EX v4.08 and previous versions
CWE ID-CWE-20
Improper Input Validation
CVE-2010-1322
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.84% / 82.20%
||
7 Day CHG~0.00%
Published-07 Oct, 2010 | 20:21
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.

Action-Not Available
Vendor-n/aMIT (Massachusetts Institute of Technology)
Product-kerberos_5n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2010-1645
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-1.96% / 82.76%
||
7 Day CHG~0.00%
Published-23 Aug, 2010 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cacti before 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in (1) the FQDN field of a Device or (2) the Vertical Label field of a Graph Template.

Action-Not Available
Vendor-n/aThe Cacti Group, Inc.
Product-cactin/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-8300
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-18.21% / 94.95%
||
7 Day CHG~0.00%
Published-11 Jul, 2018 | 00:00
Updated-05 Aug, 2024 | 06:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka "Microsoft SharePoint Remote Code Execution Vulnerability." This affects Microsoft SharePoint.

Action-Not Available
Vendor-Microsoft Corporation
Product-sharepoint_enterprise_serverMicrosoft SharePoint
CWE ID-CWE-20
Improper Input Validation
CVE-2018-7777
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-8.8||HIGH
EPSS-8.62% / 92.08%
||
7 Day CHG~0.00%
Published-03 Jul, 2018 | 14:00
Updated-17 Sep, 2024 | 03:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vulnerability is due to insufficient handling of update_file request parameter on update_module.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server.

Action-Not Available
Vendor-
Product-u.motion_builderU.Motion
CWE ID-CWE-20
Improper Input Validation
CVE-2018-2462
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-8.8||HIGH
EPSS-0.75% / 72.14%
||
7 Day CHG~0.00%
Published-11 Sep, 2018 | 15:00
Updated-05 Aug, 2024 | 04:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In certain cases, BEx Web Java Runtime Export Web Service in SAP NetWeaver BI 7.30, 7.31. 7.40, 7.41, 7.50, does not sufficiently validate an XML document accepted from an untrusted source.

Action-Not Available
Vendor-SAP SE
Product-netweaverSAP NetWeaver BI
CWE ID-CWE-20
Improper Input Validation
CVE-2018-20912
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.64% / 69.60%
||
7 Day CHG~0.00%
Published-01 Aug, 2019 | 14:42
Updated-05 Aug, 2024 | 12:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cPanel before 70.0.23 allows demo accounts to execute code via awstats (SEC-362).

Action-Not Available
Vendor-n/acPanel (WebPros International, LLC)
Product-cpaneln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-20879
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.50% / 64.80%
||
7 Day CHG~0.00%
Published-01 Aug, 2019 | 12:52
Updated-05 Aug, 2024 | 12:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cPanel before 74.0.8 allows demo accounts to execute arbitrary code via the Fileman::viewfile API (SEC-444).

Action-Not Available
Vendor-n/acPanel (WebPros International, LLC)
Product-cpaneln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-6554
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-65.52% / 98.43%
||
7 Day CHG~0.00%
Published-23 May, 2013 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

functions/html_to_text.php in the Chat module before 1.5.2 for activeCollab allows remote authenticated users to execute arbitrary PHP code via the message[message_text] parameter to chat/add_messag, which is not properly handled when executing the preg_replace function with the eval switch.

Action-Not Available
Vendor-a51devn/a
Product-activecollab_chat_modulen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-27660
Matching Score-4
Assigner-Johnson Controls
ShareView Details
Matching Score-4
Assigner-Johnson Controls
CVSS Score-8.8||HIGH
EPSS-1.16% / 77.77%
||
7 Day CHG~0.00%
Published-01 Jul, 2021 | 13:36
Updated-16 Sep, 2024 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
C-CURE 9000

An insecure client auto update feature in C-CURE 9000 can allow remote execution of lower privileged Windows programs.

Action-Not Available
Vendor-johnsoncontrolsJohnson Controls
Product-c-cure_9000_firmwarec-cure_9000C-CURE 9000
CWE ID-CWE-20
Improper Input Validation
CVE-2017-18447
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.64% / 69.60%
||
7 Day CHG~0.00%
Published-02 Aug, 2019 | 16:22
Updated-05 Aug, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cPanel before 64.0.21 allows demo accounts to execute code via the ClamScanner_getsocket API (SEC-251).

Action-Not Available
Vendor-n/acPanel (WebPros International, LLC)
Product-cpaneln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-17222
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-8.8||HIGH
EPSS-0.85% / 74.02%
||
7 Day CHG~0.00%
Published-09 Mar, 2018 | 17:00
Updated-05 Aug, 2024 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Import Language Package function in Huawei eSpace 7950 V200R003C30; eSpace 8950 V200R003C00; V200R003C30 has a remote code execution vulnerability. An authenticated, remote attacker can craft and send the packets to the affected products after Language Package is uploaded. Due to insufficient verification of the packets, this could be exploited to execute arbitrary code.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-espace_7950espace_7950_firmwareespace_8950espace_8950_firmwareeSpace 7950; eSpace 8950
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1508
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.09% / 77.09%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 12:41
Updated-08 Nov, 2024 | 23:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Vulnerabilities

Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanagecatalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-862
Missing Authorization
CVE-2021-1506
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.12% / 77.35%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 12:41
Updated-08 Nov, 2024 | 23:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Vulnerabilities

Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanagecatalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-862
Missing Authorization
CVE-2017-17215
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-8.8||HIGH
EPSS-92.51% / 99.73%
||
7 Day CHG-0.04%
Published-20 Mar, 2018 | 15:00
Updated-05 Aug, 2024 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-hg532hg532_firmwareHG532
CWE ID-CWE-20
Improper Input Validation
CVE-2021-20206
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.12% / 31.70%
||
7 Day CHG~0.00%
Published-26 Mar, 2021 | 21:34
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Action-Not Available
Vendor-n/aThe Linux Foundation
Product-container_network_interfacecontainernetworking-cni
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-1469
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.9||CRITICAL
EPSS-0.48% / 64.16%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:06
Updated-08 Nov, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Jabber Desktop and Mobile Client Software Vulnerabilities

Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-jabberCisco Jabber
CWE ID-CWE-170
Improper Null Termination
CWE ID-CWE-20
Improper Input Validation
CVE-2020-9870
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-8.8||HIGH
EPSS-0.32% / 54.62%
||
7 Day CHG~0.00%
Published-16 Oct, 2020 | 16:33
Updated-04 Aug, 2024 | 10:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8. An attacker with memory write capability may be able to bypass pointer authentication codes and run arbitrary code.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_ostvosmac_os_xipadostvOSmacOSiOS
CWE ID-CWE-20
Improper Input Validation
CVE-2020-7870
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-6.4||MEDIUM
EPSS-0.27% / 50.40%
||
7 Day CHG~0.00%
Published-29 Jun, 2021 | 13:15
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption vulnerability exists when ezPDF improperly handles the parameter. This vulnerability exists due to insufficient validation of the parameter.

Action-Not Available
Vendor-unidocsUNIDOCS
Product-ezpdf_readerezpdf_editorezPDF EditorezPDF Reader
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-3425
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.70% / 71.17%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 18:01
Updated-13 Nov, 2024 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Privilege Escalation Vulnerabilities

Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to the level of an Administrator user on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_c9200l-48pxg-4xcatalyst_c9300-24pws-c3650-24pdws-c3650-48fsws-c3850-48pws-c3650-24tdcatalyst_c9300-48pws-c3850-24pcatalyst_c9300-48u1100_integrated_services_routerws-c3650-8x24uq4331_integrated_services_routercatalyst_c9500-16x4461_integrated_services_routercatalyst_9800-l-cws-c3650-48tscatalyst_c9200-24pws-c3850catalyst_c9300-48tcatalyst_c9200l-48pxg-2ycatalyst_c9200l-48t-4gcatalyst_c9500-12q111x_integrated_services_routercatalyst_c9500-24qws-c3650-12x48urasr_1006-xcatalyst_c9200-48tcatalyst_9800-lcatalyst_c9300-24sasr_1013catalyst_c9300l-48p-4xcatalyst_c9500-24y4cws-c3650-12x48uqcatalyst_c9200l-24t-4gws-c3650-48tdws-c3650-24pscloud_services_router_1000v4221_integrated_services_routerws-c3850-12x48ucatalyst_c9300-24ucatalyst_c9200l-48t-4xws-c3650-48fdcatalyst_9800-clws-c3650-48tqcatalyst_c9500-32ccatalyst_c9200l-48p-4gasr_1001-hxasr_1002-xws-c3650-12x48uzcatalyst_c9300l-24p-4gasr_1009-xws-c3850-12s4451-x_integrated_services_routercatalyst_c9500-32qcws-c3850-48xsws-c3850-48ucatalyst_c9200l-24p-4gcatalyst_c9300-48sws-c3650-48fqws-c3850-48f1160_integrated_services_routerws-c3850-24xucatalyst_c9300l-48t-4xws-c3650-48psasr_1002-hxcatalyst_c9300l-24t-4gintegrated_services_virtual_routerws-c3850-24tcatalyst_c9200l-24pxg-2yws-c3860ws-c3850-24ucatalyst_c9300l-24t-4xcatalyst_9800-80catalyst_9800-l-fws-c3650-24tsasr_10041109_integrated_services_routercatalyst_c9200l-24p-4xcatalyst_c9300l-24p-4xcatalyst_c9300l-48p-4gcatalyst_c9200-48p1120_integrated_services_routerws-c3650-48pdcatalyst_c9300-48uncatalyst_c9200l-24t-4x1111x_integrated_services_routercatalyst_c9300-48uxmws-c3650-48pqcatalyst_9800-404321_integrated_services_routercatalyst_c9300-24t4431_integrated_services_routercatalyst_c9200l-24pxg-4xcatalyst_c9500-40xios_xecatalyst_c9300l-48t-4gcatalyst_c9500-48y4casr_1006ws-c3850-24sws-c3850-24xscatalyst_c9300-24uxcatalyst_c9200-24tasr_1001-xws-c3650-24pdm1101_integrated_services_routerws-c3850-12xsws-c3650-48fqmws-c3850-48t4351_integrated_services_routercatalyst_c9200l-48p-4xCisco IOS XE Software 16.1.1
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found