Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2012-2947

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-02 Jun, 2012 | 15:00
Updated At-06 Aug, 2024 | 19:50
Rejected At-
Credits

chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:02 Jun, 2012 | 15:00
Updated At:06 Aug, 2024 | 19:50
Rejected At:
▼CVE Numbering Authority (CNA)

chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2012/dsa-2493
vendor-advisory
x_refsource_DEBIAN
http://www.securitytracker.com/id?1027102
vdb-entry
x_refsource_SECTRACK
http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html
mailing-list
x_refsource_BUGTRAQ
http://downloads.asterisk.org/pub/security/AST-2012-007.html
x_refsource_CONFIRM
http://secunia.com/advisories/49303
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2012/dsa-2493
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.securitytracker.com/id?1027102
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://downloads.asterisk.org/pub/security/AST-2012-007.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/49303
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2012/dsa-2493
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.securitytracker.com/id?1027102
vdb-entry
x_refsource_SECTRACK
x_transferred
http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://downloads.asterisk.org/pub/security/AST-2012-007.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/49303
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2012/dsa-2493
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1027102
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://downloads.asterisk.org/pub/security/AST-2012-007.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/49303
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:02 Jun, 2012 | 15:55
Updated At:11 Apr, 2025 | 00:51

chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.02.6LOW
AV:N/AC:H/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 2.6
Base severity: LOW
Vector:
AV:N/AC:H/Au:N/C:N/I:N/A:P
CPE Matches

Debian GNU/Linux
debian
>>debian_linux>>6.0
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.0
cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.1
cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.1
cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.1.1
cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.1.2
cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.2
cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.2.1
cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.2.2
cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.2.3
cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.2.4
cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.3
cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.3
cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.3
cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.3
cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.3.1
cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.3.2
cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.3.3
cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.4
cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.4
cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.4
cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.4
cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.4.1
cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.4.2
cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.4.3
cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.4.4
cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.5
cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.5
cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.5.0
cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.6.0
cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.6.0
cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.6.0
cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.6.0
cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.7.0
cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.7.0
cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.7.0
cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.7.1
cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.8.0
cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.8.0
cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.8.0
cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>1.8.8.0
cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-284Primarynvd@nist.gov
CWE ID: CWE-284
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.htmlcve@mitre.org
Broken Link
http://downloads.asterisk.org/pub/security/AST-2012-007.htmlcve@mitre.org
Vendor Advisory
http://secunia.com/advisories/49303cve@mitre.org
Not Applicable
http://www.debian.org/security/2012/dsa-2493cve@mitre.org
Third Party Advisory
http://www.securitytracker.com/id?1027102cve@mitre.org
Third Party Advisory
VDB Entry
http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://downloads.asterisk.org/pub/security/AST-2012-007.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/49303af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.debian.org/security/2012/dsa-2493af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securitytracker.com/id?1027102af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://downloads.asterisk.org/pub/security/AST-2012-007.html
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/49303
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://www.debian.org/security/2012/dsa-2493
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.securitytracker.com/id?1027102
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://downloads.asterisk.org/pub/security/AST-2012-007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/49303
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://www.debian.org/security/2012/dsa-2493
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.securitytracker.com/id?1027102
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

69Records found

CVE-2016-1676
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-8.8||HIGH
EPSS-1.36% / 79.36%
||
7 Day CHG~0.00%
Published-05 Jun, 2016 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.63 does not properly use prototypes, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.

Action-Not Available
Vendor-n/aopenSUSESUSERed Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_serverleapopensuseenterprise_linux_desktopenterprise_linux_workstationchromedebian_linuxlinux_enterprisen/a
CWE ID-CWE-284
Improper Access Control
CVE-2022-32212
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-8.1||HIGH
EPSS-0.08% / 24.81%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 00:00
Updated-30 Apr, 2025 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.

Action-Not Available
Vendor-Node.js (OpenJS Foundation)Siemens AGFedora ProjectDebian GNU/Linux
Product-debian_linuxsinec_insfedoranode.jsNode
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-1129
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 35.26%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 14:00
Updated-17 Sep, 2024 | 01:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

Action-Not Available
Vendor-cephDebian GNU/LinuxRed Hat, Inc.openSUSE
Product-ceph_storageenterprise_linux_serverdebian_linuxenterprise_linux_workstationenterprise_linuxceph_storage_monceph_storage_osdenterprise_linux_desktopcephleapceph
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2015-7560
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-4.07% / 88.08%
||
7 Day CHG~0.00%
Published-13 Mar, 2016 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.

Action-Not Available
Vendor-n/aSambaDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxubuntu_linuxsamban/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-5623
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4||MEDIUM
EPSS-43.07% / 97.40%
||
7 Day CHG~0.00%
Published-03 Aug, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress before 4.2.3 does not properly verify the edit_posts capability, which allows remote authenticated users to bypass intended access restrictions and create drafts by leveraging the Subscriber role, as demonstrated by a post-quickdraft-save action to wp-admin/post.php.

Action-Not Available
Vendor-n/aDebian GNU/LinuxWordPress.org
Product-debian_linuxwordpressn/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-3148
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-1.44% / 79.92%
||
7 Day CHG~0.00%
Published-24 Apr, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.

Action-Not Available
Vendor-n/aopenSUSEFedora ProjectApple Inc.Debian GNU/LinuxHP Inc.Canonical Ltd.CURL
Product-libcurlsystem_management_homepagefedoraopensuseubuntu_linuxcurldebian_linuxmac_os_xn/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-1854
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.43% / 61.77%
||
7 Day CHG~0.00%
Published-19 Sep, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora Project
Product-389_directory_serverdebian_linuxfedoran/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-0840
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-4.3||MEDIUM
EPSS-0.74% / 71.98%
||
7 Day CHG~0.00%
Published-13 Apr, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.
Product-dpkgubuntu_linuxn/a
CWE ID-CWE-284
Improper Access Control
CVE-2014-9513
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-6.55% / 90.75%
||
7 Day CHG~0.00%
Published-28 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure use of temporary files in xbindkeys-config 0.1.3-2 allows remote attackers to execute arbitrary code.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-xbindkeys-confign/a
CWE ID-CWE-284
Improper Access Control
CVE-2014-7810
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-9.32% / 92.43%
||
7 Day CHG~0.00%
Published-07 Jun, 2015 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation.

Action-Not Available
Vendor-n/aThe Apache Software FoundationDebian GNU/LinuxHP Inc.
Product-debian_linuxtomcathp-uxn/a
CWE ID-CWE-284
Improper Access Control
CVE-2022-27635
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.03% / 8.11%
||
7 Day CHG+0.01%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-wireless-ac_9560killer_wireless-ac_1550i\/skillerwi-fi_6e_ax211wi-fi_6e_ax210wireless-ac_9462killer_wi-fi_6e_ax1675x\/wuefi_firmwarewireless-ac_9461killer_wi-fi_6e_ax1675i\/sdebian_linuxkiller_wi-fi_6_ax1650i\/sfedorawi-fi_6_ax201killer_wi-fi_6e_ax1690i\/swi-fi_6e_ax411proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software
CWE ID-CWE-284
Improper Access Control
CVE-2022-23134
Matching Score-6
Assigner-Zabbix
ShareView Details
Matching Score-6
Assigner-Zabbix
CVSS Score-3.7||LOW
EPSS-93.08% / 99.78%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 15:50
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-08||Apply updates per vendor instructions.
Possible view of the setup pages by unauthenticated users if config file already exists

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

Action-Not Available
Vendor-Fedora ProjectZABBIXDebian GNU/Linux
Product-debian_linuxzabbixfedoraFrontendFrontend
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2020-25654
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.08% / 23.87%
||
7 Day CHG~0.00%
Published-24 Nov, 2020 | 00:00
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.

Action-Not Available
Vendor-clusterlabsn/aDebian GNU/Linux
Product-pacemakerdebian_linuxpacemaker
CWE ID-CWE-284
Improper Access Control
CVE-2020-11028
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.70% / 70.99%
||
7 Day CHG~0.00%
Published-30 Apr, 2020 | 22:15
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated disclosure of certain private posts in WordPress

In affected versions of WordPress, some private posts, which were previously public, can result in unauthenticated disclosure under a specific set of conditions. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

Action-Not Available
Vendor-WordPressDebian GNU/LinuxWordPress.org
Product-wordpressdebian_linuxWordPress
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2015-2559
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-3.5||LOW
EPSS-0.27% / 50.26%
||
7 Day CHG~0.00%
Published-25 Mar, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Drupal 6.x before 6.35 and 7.x before 7.35 allows remote authenticated users to reset the password of other accounts by leveraging an account with the same password hash as another account and a crafted password reset URL.

Action-Not Available
Vendor-n/aThe Drupal AssociationDebian GNU/Linux
Product-debian_linuxdrupaln/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-1336
Matching Score-6
Assigner-Canonical Ltd.
ShareView Details
Matching Score-6
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.36% / 57.49%
||
7 Day CHG~0.00%
Published-27 Sep, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The daily mandb cleanup job in Man-db before 2.7.6.1-1 as packaged in Ubuntu and Debian allows local users with access to the man account to gain privileges via vectors involving insecure chown use.

Action-Not Available
Vendor-man-db_projectn/aDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxman-dbn/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-1253
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.13% / 77.42%
||
7 Day CHG~0.00%
Published-20 May, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.

Action-Not Available
Vendor-n/aGoogle LLCDebian GNU/Linux
Product-debian_linuxchromen/a
CWE ID-CWE-284
Improper Access Control
CVE-2021-4037
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.57%
||
7 Day CHG~0.00%
Published-24 Aug, 2022 | 00:00
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kernelKernel
CWE ID-CWE-284
Improper Access Control
CVE-2021-3864
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7||HIGH
EPSS-0.32% / 54.45%
||
7 Day CHG-0.11%
Published-26 Aug, 2022 | 15:25
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxlinux_kernelenterprise_linuxkernel
CWE ID-CWE-284
Improper Access Control
  • Previous
  • 1
  • 2
  • Next
Details not found