Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2011-2749

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-15 Aug, 2011 | 21:00
Updated At-06 Aug, 2024 | 23:08
Rejected At-
Credits

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:15 Aug, 2011 | 21:00
Updated At:06 Aug, 2024 | 23:08
Rejected At:
▼CVE Numbering Authority (CNA)

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.ubuntu.com/usn/USN-1190-1
vendor-advisory
x_refsource_UBUNTU
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/45595
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html
vendor-advisory
x_refsource_SUSE
http://www.debian.org/security/2011/dsa-2292
vendor-advisory
x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2011-1160.html
vendor-advisory
x_refsource_REDHAT
http://securitytracker.com/id?1025918
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/45817
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/49120
vdb-entry
x_refsource_BID
http://www.isc.org/files/release-notes/DHCP%204.1-ESV-R3.html
x_refsource_CONFIRM
http://www.isc.org/files/release-notes/DHCP%203.1-ESV-R3_0.html
x_refsource_CONFIRM
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
x_refsource_CONFIRM
http://secunia.com/advisories/45582
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/attachment.cgi?id=517665&action=diff
x_refsource_CONFIRM
http://secunia.com/advisories/45918
third-party-advisory
x_refsource_SECUNIA
http://www.isc.org/software/dhcp/advisories/cve-2011-2748
x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-201301-06.xml
vendor-advisory
x_refsource_GENTOO
http://www.isc.org/files/release-notes/DHCP%204.2.2_0.html
x_refsource_CONFIRM
http://secunia.com/advisories/45639
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=729382
x_refsource_CONFIRM
http://secunia.com/advisories/45629
third-party-advisory
x_refsource_SECUNIA
https://hermes.opensuse.org/messages/11695711
vendor-advisory
x_refsource_SUSE
http://www.mandriva.com/security/advisories?name=MDVSA-2011:128
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/46780
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/USN-1190-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/45595
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.debian.org/security/2011/dsa-2292
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1160.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://securitytracker.com/id?1025918
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/45817
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/49120
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.isc.org/files/release-notes/DHCP%204.1-ESV-R3.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.isc.org/files/release-notes/DHCP%203.1-ESV-R3_0.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/45582
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/attachment.cgi?id=517665&action=diff
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/45918
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.isc.org/software/dhcp/advisories/cve-2011-2748
Resource:
x_refsource_CONFIRM
Hyperlink: http://security.gentoo.org/glsa/glsa-201301-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.isc.org/files/release-notes/DHCP%204.2.2_0.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/45639
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=729382
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/45629
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://hermes.opensuse.org/messages/11695711
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:128
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/46780
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.ubuntu.com/usn/USN-1190-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/45595
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.debian.org/security/2011/dsa-2292
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.redhat.com/support/errata/RHSA-2011-1160.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://securitytracker.com/id?1025918
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/45817
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/49120
vdb-entry
x_refsource_BID
x_transferred
http://www.isc.org/files/release-notes/DHCP%204.1-ESV-R3.html
x_refsource_CONFIRM
x_transferred
http://www.isc.org/files/release-notes/DHCP%203.1-ESV-R3_0.html
x_refsource_CONFIRM
x_transferred
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/45582
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/attachment.cgi?id=517665&action=diff
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/45918
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.isc.org/software/dhcp/advisories/cve-2011-2748
x_refsource_CONFIRM
x_transferred
http://security.gentoo.org/glsa/glsa-201301-06.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.isc.org/files/release-notes/DHCP%204.2.2_0.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/45639
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=729382
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/45629
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://hermes.opensuse.org/messages/11695711
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2011:128
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/46780
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-1190-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/45595
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.debian.org/security/2011/dsa-2292
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1160.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://securitytracker.com/id?1025918
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/45817
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/49120
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.isc.org/files/release-notes/DHCP%204.1-ESV-R3.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.isc.org/files/release-notes/DHCP%203.1-ESV-R3_0.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/45582
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/attachment.cgi?id=517665&action=diff
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/45918
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.isc.org/software/dhcp/advisories/cve-2011-2748
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201301-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.isc.org/files/release-notes/DHCP%204.2.2_0.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/45639
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=729382
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/45629
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://hermes.opensuse.org/messages/11695711
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:128
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/46780
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:15 Aug, 2011 | 21:55
Updated At:11 Apr, 2025 | 00:51

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0
cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.1
cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.2
cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.2
cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.2
cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.2
cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.2
cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.3
cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.3
cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.3
cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.4
cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.4
cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.4
cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.4
cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.4
cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.5
cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.5
cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.0.6
cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1
cpe:2.3:a:isc:dhcp:3.1:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1-esv
cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.0
cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.0
cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.0
cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.0
cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.0
cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.0
cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.0
cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.1
cpe:2.3:a:isc:dhcp:3.1.1:-:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.1
cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.1
cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.2
cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.2
cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.2
cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.3
cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.3
cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>3.1.3
cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>4.0
cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>dhcp>>4.0-esv
cpe:2.3:a:isc:dhcp:4.0-esv:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761cve@mitre.org
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.htmlcve@mitre.org
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.htmlcve@mitre.org
Mailing List
Third Party Advisory
http://secunia.com/advisories/45582cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/45595cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/45629cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/45639cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/45817cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/45918cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/46780cve@mitre.org
Third Party Advisory
http://security.gentoo.org/glsa/glsa-201301-06.xmlcve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1025918cve@mitre.org
Third Party Advisory
VDB Entry
http://www.debian.org/security/2011/dsa-2292cve@mitre.org
Third Party Advisory
http://www.isc.org/files/release-notes/DHCP%203.1-ESV-R3_0.htmlcve@mitre.org
Vendor Advisory
http://www.isc.org/files/release-notes/DHCP%204.1-ESV-R3.htmlcve@mitre.org
Vendor Advisory
http://www.isc.org/files/release-notes/DHCP%204.2.2_0.htmlcve@mitre.org
Vendor Advisory
http://www.isc.org/software/dhcp/advisories/cve-2011-2748cve@mitre.org
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:128cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1160.htmlcve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/49120cve@mitre.org
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/USN-1190-1cve@mitre.org
Third Party Advisory
https://bugzilla.redhat.com/attachment.cgi?id=517665&action=diffcve@mitre.org
Issue Tracking
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=729382cve@mitre.org
Issue Tracking
Patch
Third Party Advisory
https://hermes.opensuse.org/messages/11695711cve@mitre.org
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://secunia.com/advisories/45582af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/45595af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/45629af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/45639af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/45817af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/45918af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/46780af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-201301-06.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1025918af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.debian.org/security/2011/dsa-2292af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.isc.org/files/release-notes/DHCP%203.1-ESV-R3_0.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.isc.org/files/release-notes/DHCP%204.1-ESV-R3.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.isc.org/files/release-notes/DHCP%204.2.2_0.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.isc.org/software/dhcp/advisories/cve-2011-2748af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:128af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1160.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/49120af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/USN-1190-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/attachment.cgi?id=517665&action=diffaf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=729382af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Patch
Third Party Advisory
https://hermes.opensuse.org/messages/11695711af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45582
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45595
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45629
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45639
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45817
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45918
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/46780
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-201301-06.xml
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://securitytracker.com/id?1025918
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.debian.org/security/2011/dsa-2292
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.isc.org/files/release-notes/DHCP%203.1-ESV-R3_0.html
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.isc.org/files/release-notes/DHCP%204.1-ESV-R3.html
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.isc.org/files/release-notes/DHCP%204.2.2_0.html
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.isc.org/software/dhcp/advisories/cve-2011-2748
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:128
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1160.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/49120
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.ubuntu.com/usn/USN-1190-1
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/attachment.cgi?id=517665&action=diff
Source: cve@mitre.org
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=729382
Source: cve@mitre.org
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://hermes.opensuse.org/messages/11695711
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45582
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45595
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45629
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45639
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45817
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/45918
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/46780
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-201301-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://securitytracker.com/id?1025918
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.debian.org/security/2011/dsa-2292
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.isc.org/files/release-notes/DHCP%203.1-ESV-R3_0.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.isc.org/files/release-notes/DHCP%204.1-ESV-R3.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.isc.org/files/release-notes/DHCP%204.2.2_0.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.isc.org/software/dhcp/advisories/cve-2011-2748
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:128
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1160.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/49120
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.ubuntu.com/usn/USN-1190-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/attachment.cgi?id=517665&action=diff
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=729382
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://hermes.opensuse.org/messages/11695711
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1222Records found

CVE-2017-11104
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-2.58% / 84.98%
||
7 Day CHG~0.00%
Published-08 Jul, 2017 | 10:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.

Action-Not Available
Vendor-knot-dnsn/aDebian GNU/Linux
Product-knot_dnsdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-1271
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.72% / 71.49%
||
7 Day CHG~0.00%
Published-31 Aug, 2022 | 15:33
Updated-09 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.

Action-Not Available
Vendor-tukaanin/aGNUDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxgzipxzjboss_data_gridgzip, xz-utils
CWE ID-CWE-179
Incorrect Behavior Order: Early Validation
CWE ID-CWE-20
Improper Input Validation
CVE-2017-0900
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-12.22% / 93.59%
||
7 Day CHG~0.00%
Published-31 Aug, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.

Action-Not Available
Vendor-rubygemsn/aRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationrubygemsenterprise_linux_server_eusdebian_linuxenterprise_linux_serverenterprise_linux_server_ausn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-0917
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 24.30%
||
7 Day CHG~0.00%
Published-21 Mar, 2018 | 20:00
Updated-05 Aug, 2024 | 13:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Gitlab Community Edition version 10.2.4 is vulnerable to lack of input validation in the CI job component resulting in persistent cross site scripting.

Action-Not Available
Vendor-Debian GNU/LinuxGitLab Inc.
Product-debian_linuxgitlabGitLab Community and Enterprise Editions
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-20
Improper Input Validation
CVE-2017-0901
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-18.95% / 95.08%
||
7 Day CHG+0.40%
Published-31 Aug, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.

Action-Not Available
Vendor-rubygemsDebian GNU/LinuxCanonical Ltd.HackerOneRed Hat, Inc.
Product-enterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationrubygemsenterprise_linux_server_eusdebian_linuxenterprise_linux_serverubuntu_linuxenterprise_linux_server_ausRubyGems
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2017-0916
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-1.29% / 78.84%
||
7 Day CHG~0.00%
Published-21 Mar, 2018 | 20:00
Updated-05 Aug, 2024 | 13:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Gitlab Community Edition version 10.3 is vulnerable to a lack of input validation in the system_hook_push queue through web hook component resulting in remote code execution.

Action-Not Available
Vendor-Debian GNU/LinuxGitLab Inc.
Product-debian_linuxgitlabGitLab Community and Enterprise Editions
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2017-0915
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-1.40% / 79.65%
||
7 Day CHG~0.00%
Published-21 Mar, 2018 | 20:00
Updated-05 Aug, 2024 | 13:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Gitlab Community Edition version 10.2.4 is vulnerable to a lack of input validation in the GitlabProjectsImportService resulting in remote code execution.

Action-Not Available
Vendor-Debian GNU/LinuxGitLab Inc.
Product-debian_linuxgitlabGitLab Community and Enterprise Editions
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12367
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.74% / 71.90%
||
7 Day CHG~0.00%
Published-18 Oct, 2018 | 13:00
Updated-05 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the previous mitigations for Spectre, the resolution or precision of various methods was reduced to counteract the ability to measure precise time intervals. In that work PerformanceNavigationTiming was not adjusted but it was found that it could be used as a precision timer. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.

Action-Not Available
Vendor-Canonical Ltd.Mozilla CorporationDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxthunderbirdfirefoxfirefox_esrThunderbirdFirefox ESRFirefox
CWE ID-CWE-20
Improper Input Validation
CVE-2017-0368
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 48.91%
||
7 Day CHG~0.00%
Published-13 Apr, 2018 | 16:00
Updated-16 Sep, 2024 | 23:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Make rawHTML mode not apply to system messages

Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw making rawHTML mode apply to system messages.

Action-Not Available
Vendor-Debian GNU/LinuxWikimedia Foundation
Product-debian_linuxmediawikimediawiki
CWE ID-CWE-20
Improper Input Validation
CVE-2016-9939
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.92% / 90.26%
||
7 Day CHG~0.00%
Published-30 Jan, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.

Action-Not Available
Vendor-cryptoppn/aDebian GNU/Linux
Product-crypto\+\+debian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-9444
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-53.18% / 97.88%
||
7 Day CHG~0.00%
Published-12 Jan, 2017 | 06:06
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-9955
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-6.3||MEDIUM
EPSS-0.41% / 60.50%
||
7 Day CHG~0.00%
Published-16 Feb, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SimpleSAML_XML_Validator class constructor in SimpleSAMLphp before 1.14.11 might allow remote attackers to spoof signatures on SAML 1 responses or possibly cause a denial of service (memory consumption) by leveraging improper conversion of return values to boolean.

Action-Not Available
Vendor-simplesamlphpn/aDebian GNU/Linux
Product-simplesamlphpdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-9147
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-52.54% / 97.85%
||
7 Day CHG~0.00%
Published-12 Jan, 2017 | 06:06
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-7795
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.16% / 37.37%
||
7 Day CHG~0.00%
Published-13 Oct, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.

Action-Not Available
Vendor-systemd_projectn/aCanonical Ltd.
Product-systemdubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-7691
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-6.22% / 90.50%
||
7 Day CHG~0.00%
Published-07 Aug, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.

Action-Not Available
Vendor-ntpn/aDebian GNU/LinuxRed Hat, Inc.Oracle CorporationNetApp, Inc.
Product-oncommand_unified_managerlinuxoncommand_performance_managerenterprise_linux_desktopenterprise_linux_server_ausenterprise_linux_server_tusenterprise_linux_workstationclustered_data_ontapenterprise_linux_server_eusdebian_linuxenterprise_linux_serverntpdata_ontapn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-7072
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 6.56%
||
7 Day CHG~0.00%
Published-10 Sep, 2018 | 17:00
Updated-06 Aug, 2024 | 01:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been found in PowerDNS Authoritative Server before 3.4.11 and 4.0.2 allowing a remote, unauthenticated attacker to cause a denial of service by opening a large number of TCP connections to the web server. If the web server runs out of file descriptors, it triggers an exception and terminates the whole PowerDNS process. While it's more complicated for an unauthorized attacker to make the web server run out of file descriptors since its connection will be closed just after being accepted, it might still be possible.

Action-Not Available
Vendor-powerdnsOpen-Xchange AGDebian GNU/Linux
Product-debian_linuxauthoritativepdns
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2016-7162
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.15% / 77.62%
||
7 Day CHG~0.00%
Published-26 Sep, 2016 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.

Action-Not Available
Vendor-file_roller_projectn/aCanonical Ltd.
Product-ubuntu_linuxfile_rollern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-7074
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.00% / 0.16%
||
7 Day CHG~0.00%
Published-11 Sep, 2018 | 13:00
Updated-06 Aug, 2024 | 01:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature.

Action-Not Available
Vendor-powerdnsOpen-Xchange AGDebian GNU/Linux
Product-debian_linuxauthoritativerecursorpdns
CWE ID-CWE-20
Improper Input Validation
CVE-2022-40277
Matching Score-6
Assigner-Fluid Attacks
ShareView Details
Matching Score-6
Assigner-Fluid Attacks
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.37%
||
7 Day CHG~0.00%
Published-30 Sep, 2022 | 16:20
Updated-20 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.

Action-Not Available
Vendor-joplinappn/aCanonical Ltd.Linux Kernel Organization, Inc
Product-joplinubuntu_linuxlinux_kernelJoplin
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12565
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-2.63% / 85.12%
||
7 Day CHG~0.00%
Published-19 Jun, 2018 | 05:00
Updated-05 Aug, 2024 | 08:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.

Action-Not Available
Vendor-linaron/aDebian GNU/Linux
Product-debian_linuxlavan/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-2712
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-9.99% / 92.75%
||
7 Day CHG~0.00%
Published-16 Jun, 2008 | 21:00
Updated-07 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw. NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298. NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.

Action-Not Available
Vendor-n/aVimCanonical Ltd.
Product-ubuntu_linuxvimn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-38076
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.8||LOW
EPSS-0.09% / 26.02%
||
7 Day CHG+0.02%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-wireless-ac_9461wireless-ac_9560debian_linuxfedorakillerdual_band_wireless-ac_3165dual_band_wireless-ac_8260wireless-ac_9260dual_band_wireless-ac_3168wireless_7265_\(rev_d\)wireless-ac_9462killer_wireless-ac_1550dual_band_wireless-ac_8265uefi_firmwareproset\/wireless_wifiIntel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software
CWE ID-CWE-20
Improper Input Validation
CVE-2016-6224
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 28.18%
||
7 Day CHG~0.00%
Published-22 Jul, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.

Action-Not Available
Vendor-ecryptfsn/aCanonical Ltd.
Product-ecryptfs-utilsubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-6128
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-5.84% / 90.19%
||
7 Day CHG~0.00%
Published-07 Aug, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.

Action-Not Available
Vendor-libgdn/aopenSUSEThe PHP GroupDebian GNU/LinuxCanonical Ltd.
Product-leapubuntu_linuxlibgdphpdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-6170
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-2.05% / 83.15%
||
7 Day CHG-0.56%
Published-06 Jul, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.

Action-Not Available
Vendor-n/aRed Hat, Inc.Internet Systems Consortium, Inc.
Product-enterprise_linuxbindn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-36351
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.09% / 25.59%
||
7 Day CHG+0.01%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-killer_wi-fi_6e_ax1690wi-fi_6_ax203debian_linuxfedorakillerwi-fi_6_ax201wi-fi_6e_ax211killer_wi-fi_6e_ax1675wi-fi_6e_ax210wi-fi_6_ax200wi-fi_6e_ax411killer_wi-fi_6_ax1650wi-fi_6_ax101uefi_firmwareproset\/wireless_wifiIntel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software
CWE ID-CWE-20
Improper Input Validation
CVE-2016-5291
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 9.49%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-06 Aug, 2024 | 00:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.

Action-Not Available
Vendor-Debian GNU/LinuxMozilla Corporation
Product-firefoxthunderbirddebian_linuxfirefox_esrThunderbirdFirefox ESRFirefox
CWE ID-CWE-20
Improper Input Validation
CVE-2016-5293
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 28.34%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-06 Aug, 2024 | 00:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When the Mozilla Updater is run, if the Updater's log file in the working directory points to a hardlink, data can be appended to an arbitrary local file. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

Action-Not Available
Vendor-Debian GNU/LinuxMozilla CorporationMicrosoft Corporation
Product-firefoxwindowsdebian_linuxfirefox_esrFirefoxFirefox ESR
CWE ID-CWE-20
Improper Input Validation
CVE-2016-5828
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.69%
||
7 Day CHG+0.05%
Published-27 Jun, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxNovellCanonical Ltd.
Product-suse_linux_enterprise_real_time_extensionlinux_kerneldebian_linuxubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-35252
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-3.7||LOW
EPSS-0.08% / 24.83%
||
7 Day CHG~0.00%
Published-23 Sep, 2022 | 00:00
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.

Action-Not Available
Vendor-n/aCURLSplunk LLC (Cisco Systems, Inc.)Apple Inc.NetApp, Inc.Debian GNU/Linux
Product-h410smacosdebian_linuxh500s_firmwarehci_compute_nodeh700s_firmwarecurlsolidfirebootstrap_osh410s_firmwareh700sh300s_firmwareh500suniversal_forwarderelement_softwareclustered_data_ontaph300shci_management_nodehttps://github.com/curl/curl
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4476
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.59% / 68.14%
||
7 Day CHG~0.00%
Published-09 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

Action-Not Available
Vendor-w1.fin/aCanonical Ltd.
Product-ubuntu_linuxwpa_supplicanthostapdn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4555
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-43.06% / 97.40%
||
7 Day CHG~0.00%
Published-10 May, 2016 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.

Action-Not Available
Vendor-n/aSquid CacheOracle CorporationCanonical Ltd.
Product-squidlinuxubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4324
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-0.67% / 70.35%
||
7 Day CHG~0.00%
Published-08 Jul, 2016 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in LibreOffice before 5.1.4 allows remote attackers to execute arbitrary code via a crafted RTF file, related to stylesheet and superscript tokens.

Action-Not Available
Vendor-libreofficen/aDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxubuntu_linuxlibreofficen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4353
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.80% / 73.03%
||
7 Day CHG~0.00%
Published-13 Jun, 2016 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ber-decoder.c in Libksba before 1.3.3 does not properly handle decoder stack overflows, which allows remote attackers to cause a denial of service (abort) via crafted BER data.

Action-Not Available
Vendor-gnupgn/aCanonical Ltd.
Product-ubuntu_linuxlibksban/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4579
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.5||HIGH
EPSS-1.33% / 79.11%
||
7 Day CHG-0.85%
Published-13 Jun, 2016 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."

Action-Not Available
Vendor-gnupgn/aopenSUSECanonical Ltd.
Product-leapubuntu_linuxlibksban/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4449
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.14% / 34.73%
||
7 Day CHG~0.00%
Published-09 Jun, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.

Action-Not Available
Vendor-n/alibxml2 (XMLSoft)Debian GNU/LinuxCanonical Ltd.
Product-libxml2debian_linuxubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-5178
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-9.8||CRITICAL
EPSS-1.85% / 82.28%
||
7 Day CHG~0.00%
Published-23 May, 2017 | 03:56
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.143 allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRed Hat, Inc.Fedora ProjectopenSUSEGoogle LLC
Product-chromeenterprise_linux_workstation_supplementaryfedoraleapenterprise_linux_server_supplementarydebian_linuxopensusen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4348
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.08% / 86.23%
||
7 Day CHG+1.16%
Published-20 May, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _rsvg_css_normalize_font_size function in librsvg 2.40.2 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via circular definitions in an SVG document.

Action-Not Available
Vendor-n/aThe GNOME ProjectDebian GNU/LinuxopenSUSE
Product-debian_linuxleapopensuselibrsvgn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-3068
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-2.85% / 85.70%
||
7 Day CHG~0.00%
Published-13 Apr, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.

Action-Not Available
Vendor-mercurialn/aopenSUSESUSERed Hat, Inc.Fedora ProjectDebian GNU/Linux
Product-enterprise_linux_serverenterprise_linux_server_ausenterprise_linux_hpc_nodefedoraenterprise_linux_hpc_node_eusopensuseenterprise_linux_desktopleapenterprise_linux_server_euslinux_enterprise_software_development_kitenterprise_linux_workstationdebian_linuxmercuriallinux_enterprise_debuginfon/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-3961
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 32.56%
||
7 Day CHG~0.00%
Published-15 Apr, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.

Action-Not Available
Vendor-n/aXen ProjectCanonical Ltd.
Product-ubuntu_linuxxenn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-3705
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.88% / 74.35%
||
7 Day CHG~0.00%
Published-17 May, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.

Action-Not Available
Vendor-n/aCanonical Ltd.HP Inc.libxml2 (XMLSoft)Debian GNU/LinuxopenSUSE
Product-icewall_file_managerlibxml2leapicewall_federation_agentubuntu_linuxdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4085
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.65% / 69.96%
||
7 Day CHG~0.00%
Published-25 Apr, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.

Action-Not Available
Vendor-n/aWireshark FoundationDebian GNU/LinuxOracle Corporation
Product-wiresharkdebian_linuxsolarisn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-3714
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.4||HIGH
EPSS-93.86% / 99.86%
||
7 Day CHG~0.00%
Published-05 May, 2016 | 18:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-09-30||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."

Action-Not Available
Vendor-n/aSUSEDebian GNU/LinuxopenSUSECanonical Ltd.ImageMagick Studio LLC
Product-leapopensuseubuntu_linuximagemagicksuse_linux_enterprise_serverdebian_linuxn/asuse_linux_enterprise_serverimagemagickopensusedebian_linuxubuntu_linuxleapImageMagick
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2848
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-51.28% / 97.79%
||
7 Day CHG~0.00%
Published-21 Oct, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.1.0 through 9.8.4-P2 and 9.9.0 through 9.9.2-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via malformed options data in an OPT resource record.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2270
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.28% / 51.40%
||
7 Day CHG~0.00%
Published-19 Feb, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.

Action-Not Available
Vendor-n/aXen ProjectFedora ProjectDebian GNU/LinuxOracle Corporation
Product-debian_linuxfedoravm_serverxenn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2841
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 22.12%
||
7 Day CHG-0.02%
Published-16 Jun, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.

Action-Not Available
Vendor-n/aQEMUCanonical Ltd.
Product-ubuntu_linuxqemun/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2098
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.3||HIGH
EPSS-84.09% / 99.26%
||
7 Day CHG~0.00%
Published-07 Apr, 2016 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRuby on Rails
Product-debian_linuxruby_on_railsrailsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2143
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.17% / 38.80%
||
7 Day CHG~0.00%
Published-27 Apr, 2016 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncRed Hat, Inc.Debian GNU/LinuxOracle Corporation
Product-enterprise_linuxdebian_linuxlinux_kernellinuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2774
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-69.96% / 98.61%
||
7 Day CHG~0.00%
Published-09 Mar, 2016 | 15:26
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.Debian GNU/LinuxCanonical Ltd.
Product-debian_linuxdhcpubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2381
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-19.95% / 95.25%
||
7 Day CHG~0.00%
Published-08 Apr, 2016 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.

Action-Not Available
Vendor-perln/aopenSUSEDebian GNU/LinuxOracle CorporationCanonical Ltd.
Product-perlsolarisenterprise_manager_base_platformopensusetimesten_in-memory_databaseubuntu_linuxdatabase_serverdebian_linuxconfiguration_managercommunications_billing_and_revenue_managementn/a
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 24
  • 25
  • Next
Details not found