Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-0083

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-21 Nov, 2019 | 13:57
Updated At-06 Aug, 2024 | 09:05
Rejected At-
Credits

The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:21 Nov, 2019 | 13:57
Updated At:06 Aug, 2024 | 09:05
Rejected At:
▼CVE Numbering Authority (CNA)

The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords.

Affected Products
Vendor
ruby-net-ldap
Product
ruby-net-ldap
Versions
Affected
  • 0.16.2
Problem Types
TypeCWE IDDescription
textN/APassword
Type: text
CWE ID: N/A
Description: Password
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security-tracker.debian.org/tracker/CVE-2014-0083
x_refsource_MISC
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083
x_refsource_MISC
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0083
x_refsource_MISC
https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04a
x_refsource_CONFIRM
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2014-0083
Resource:
x_refsource_MISC
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083
Resource:
x_refsource_MISC
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0083
Resource:
x_refsource_MISC
Hyperlink: https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04a
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security-tracker.debian.org/tracker/CVE-2014-0083
x_refsource_MISC
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083
x_refsource_MISC
x_transferred
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0083
x_refsource_MISC
x_transferred
https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04a
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2014-0083
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0083
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04a
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:21 Nov, 2019 | 14:15
Updated At:18 Aug, 2020 | 15:05

The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

net-ldap_project
net-ldap_project
>>net-ldap>>Versions before 0.16.2(exclusive)
cpe:2.3:a:net-ldap_project:net-ldap:*:*:*:*:*:ruby:*:*
Debian GNU/Linux
debian
>>debian_linux>>8.0
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>9.0
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-916Primarynvd@nist.gov
CWE ID: CWE-916
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083secalert@redhat.com
Issue Tracking
Patch
Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0083secalert@redhat.com
Issue Tracking
Third Party Advisory
https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04asecalert@redhat.com
Patch
https://security-tracker.debian.org/tracker/CVE-2014-0083secalert@redhat.com
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083
Source: secalert@redhat.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0083
Source: secalert@redhat.com
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04a
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2014-0083
Source: secalert@redhat.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

180Records found

CVE-2020-28368
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 20.85%
||
7 Day CHG~0.00%
Published-10 Nov, 2020 | 18:17
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectXen Project
Product-xendebian_linuxfedoran/a
CWE ID-CWE-862
Missing Authorization
CVE-2017-9868
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 30.82%
||
7 Day CHG~0.00%
Published-25 Jun, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Mosquitto through 1.4.12, mosquitto.db (aka the persistence file) is world readable, which allows local users to obtain sensitive MQTT topic information.

Action-Not Available
Vendor-n/aEclipse Foundation AISBLDebian GNU/Linux
Product-debian_linuxmosquitton/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-40768
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.48%
||
7 Day CHG~0.00%
Published-18 Sep, 2022 | 00:00
Updated-03 Aug, 2024 | 12:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2016-1000002
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.4||LOW
EPSS-0.16% / 37.41%
||
7 Day CHG~0.00%
Published-05 Nov, 2019 | 13:08
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gdm3 3.14.2 and possibly later has an information leak before screen lock

Action-Not Available
Vendor-n/aThe GNOME ProjectDebian GNU/LinuxopenSUSERed Hat, Inc.
Product-debian_linuxleapgnome_display_managerenterprise_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-11833
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.61%
||
7 Day CHG~0.00%
Published-15 May, 2019 | 12:19
Updated-04 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.

Action-Not Available
Vendor-n/aFedora ProjectCanonical Ltd.Red Hat, Inc.Linux Kernel Organization, IncDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlinux_kernelenterprise_linux_for_real_time_for_nfv_tusenterprise_linux_server_ausenterprise_linux_workstationfedoraenterprise_linuxenterprise_linux_eusenterprise_linux_for_real_time_for_nfventerprise_linux_for_real_time_tusenterprise_linux_server_tusenterprise_linux_desktopenterprise_linux_for_real_timen/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2022-29900
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.5||MEDIUM
EPSS-1.45% / 79.97%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 15:50
Updated-20 Nov, 2024 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

Action-Not Available
Vendor-Debian GNU/LinuxFedora ProjectAdvanced Micro Devices, Inc.Xen Project
Product-epyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareathlon_silver_3050u_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7402epyc_7f32epyc_7551_firmwareepyc_7272_firmwareryzen_3_3100_firmwareryzen_threadripper_2950x_firmwareathlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500ua9-9410_firmwareathlon_x4_940_firmwareepyc_7702ryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareathlon_x4_830_firmwareryzen_3_2300uryzen_5_3600x_firmwareepyc_7542ryzen_7_3750h_firmwareryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7h12_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7f52ryzen_threadripper_pro_5945wxryzen_5_2500u_firmwareepyc_7001ryzen_3_4300g_firmwareryzen_3_3100epyc_7f32_firmwaredebian_linuxepyc_7502ryzen_7_3750hepyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwarea12-9730pryzen_3_2200u_firmwareathlon_x4_840_firmwareepyc_7281ryzen_3_2200uepyc_7551epyc_7551pepyc_7002_firmwareryzen_threadripper_2920xathlon_x4_970a10-9630pepyc_7551p_firmwareathlon_x4_950_firmwareryzen_7_3800xt_firmwareepyc_7601_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xepyc_7352ryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401epyc_7742ryzen_7_2700uepyc_7272ryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geryzen_7_2800hryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_3_4300uryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_5_2600x_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_7_2700_firmwareathlon_x4_835_firmwareryzen_5_3400g_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_4700uryzen_7_3800xa6-9220c_firmwareepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7501athlon_x4_970_firmwareepyc_7301_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_4600hryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_3_3200u_firmwareathlon_x4_750_firmwareathlon_x4_940ryzen_3_3300x_firmwareepyc_7402pepyc_7252_firmwarea4-9120_firmwareryzen_3_3300uepyc_7542_firmwarea6-9210ryzen_threadripper_pro_5945wx_firmwareryzen_3_3300g_firmwareryzen_5_3600xtryzen_5_3450gryzen_5_3550h_firmwareryzen_7_4800hepyc_7252epyc_7502pryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pryzen_9_4900ha12-9700p_firmwareepyc_7351p_firmwarea9-9420fedoraepyc_7302p_firmwareathlon_x4_840ryzen_threadripper_2970wxepyc_7642_firmwareepyc_7452epyc_7h12ryzen_7_3700u_firmwarea6-9220_firmwareathlon_x4_860k_firmwareryzen_5_2600xryzen_7_2700u_firmwareryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gryzen_5_2700epyc_7601epyc_7302ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_7_4700g_firmwareepyc_7552_firmwareryzen_5_3600xepyc_7371epyc_7f72epyc_7662a10-9630p_firmwareryzen_7_3800xtryzen_threadripper_pro_5975wx_firmwareryzen_threadripper_2970wx_firmwareepyc_7642epyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7301ryzen_7_2700xepyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_threadripper_pro_3955wxryzen_3_3200uryzen_7_4700u_firmwareryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830a6-9220cepyc_7302pepyc_7552athlon_silver_3050uathlon_x4_950ryzen_5_4600gepyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwarea6-9210_firmwareathlon_x4_835athlon_x4_845_firmwarea9-9410epyc_7402_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareepyc_7262athlon_x4_845ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxxenryzen_3_3250uepyc_7251_firmwareepyc_7401_firmwareathlon_gold_3150u_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xepyc_7452_firmwareepyc_7351ryzen_3_3300gryzen_threadripper_pro_3945wxathlon_x4_880kryzen_threadripper_3970x_firmwareryzen_3_3250u_firmwareryzen_5_3500u_firmwareryzen_5_3600ryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_7_4800uepyc_7352_firmwareepyc_7702_firmwareepyc_7532AMD Processors
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2022-2905
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.82%
||
7 Day CHG~0.00%
Published-09 Sep, 2022 | 00:00
Updated-03 Aug, 2024 | 00:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxlinux_kernelenterprise_linuxkernel
CWE ID-CWE-125
Out-of-bounds Read
CVE-2015-2157
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.27% / 49.94%
||
7 Day CHG~0.00%
Published-27 Mar, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Action-Not Available
Vendor-simon_tathamputtyn/aFedora ProjectDebian GNU/LinuxopenSUSE
Product-debian_linuxfedoraopensuseputtyn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-2045
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.08% / 23.45%
||
7 Day CHG~0.00%
Published-12 Mar, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.

Action-Not Available
Vendor-n/aXen ProjectFedora ProjectDebian GNU/Linux
Product-debian_linuxfedoraxenn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-5953
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 30.87%
||
7 Day CHG~0.00%
Published-07 Aug, 2018 | 18:00
Updated-05 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "software IO TLB" printk call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-9584
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.15% / 36.79%
||
7 Day CHG~0.00%
Published-09 Jan, 2015 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncopenSUSESUSERed Hat, Inc.Debian GNU/LinuxOracle CorporationCanonical Ltd.
Product-enterprise_linux_serverlinux_kernelenterprise_linux_ausenterprise_linux_eusevergreenenterprise_linux_server_euslinux_enterprise_real_time_extensionlinux_enterprise_desktopdebian_linuxlinuxlinux_enterprise_software_development_kitenterprise_linux_server_ausopensuseenterprise_linux_desktopubuntu_linuxenterprise_linux_server_tusenterprise_linux_workstationlinux_enterprise_workstation_extensionlinux_enterprise_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-5270
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.07% / 22.51%
||
7 Day CHG~0.00%
Published-10 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.

Action-Not Available
Vendor-gnupgn/aDebian GNU/Linux
Product-libgcryptdebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-10685
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.13% / 32.96%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 00:00
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.
Product-ceph_storagedebian_linuxopenstackstorageansible_engineansible_towerAnsible
CWE ID-CWE-459
Incomplete Cleanup
CVE-2021-34693
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.11%
||
7 Day CHG~0.00%
Published-14 Jun, 2021 | 00:00
Updated-04 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2014-3615
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.09% / 26.76%
||
7 Day CHG~0.00%
Published-01 Nov, 2014 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.

Action-Not Available
Vendor-n/aopenSUSEQEMURed Hat, Inc.Debian GNU/LinuxCanonical Ltd.
Product-enterprise_linuxenterprise_linux_serverenterprise_linux_server_ausqemuvirtualizationenterprise_linux_eusopensuseenterprise_linux_desktopubuntu_linuxenterprise_linux_server_tusenterprise_linux_workstationdebian_linuxopenstackn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-1738
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-2.1||LOW
EPSS-0.03% / 6.85%
||
7 Day CHG~0.00%
Published-11 May, 2014 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSERed Hat, Inc.Debian GNU/LinuxOracle Corporation
Product-linux_enterprise_high_availability_extensionlinux_kernelenterprise_linux_euslinux_enterprise_real_time_extensionlinux_enterprise_desktopdebian_linuxlinuxlinux_enterprise_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-26966
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 5.00%
||
7 Day CHG-0.01%
Published-12 Mar, 2022 | 21:30
Updated-03 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-h300eh500sactive_iq_unified_managerh300s_firmwareh410sh300sh300e_firmwaredebian_linuxlinux_kernelh500eh410s_firmwareh700s_firmwareh500s_firmwareh500e_firmwareh700eh700e_firmwareh700sn/a
CVE-2014-2079
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.12%
||
7 Day CHG~0.00%
Published-16 Jul, 2018 | 14:00
Updated-06 Aug, 2024 | 09:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

X File Explorer (aka xfe) might allow local users to bypass intended access restrictions and gain access to arbitrary files by leveraging failure to use directory masks when creating files on Samba and NFS shares.

Action-Not Available
Vendor-x_file_explorer_projectn/aDebian GNU/Linux
Product-debian_linuxx_file_explorern/a
CWE ID-CWE-264
Not Available
CVE-2019-9445
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.24% / 47.25%
||
7 Day CHG~0.00%
Published-06 Sep, 2019 | 21:50
Updated-04 Aug, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-n/aCanonical Ltd.Google LLCDebian GNU/Linux
Product-androiddebian_linuxubuntu_linuxAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-18710
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 17.59%
||
7 Day CHG~0.00%
Published-27 Oct, 2018 | 22:00
Updated-05 Aug, 2024 | 11:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-29155
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.24% / 46.84%
||
7 Day CHG~0.00%
Published-20 Apr, 2021 | 00:00
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-26373
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.28% / 50.64%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 00:00
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/Linux
Product-core_i3-10100xeon_gold_6300_firmwarecore_i9-7900xxeon_d-1548xeon_d-2733nt_firmwarecore_i7-10510yceleron_g5900t_firmwarecore_i7-7820x_firmwarexeon_platinum_8260yxeon_d-1633ncore_i9-9800x_firmwarexeon_d-1653nxeon_d-2173it_firmwarexeon_d-2145nt_firmwarexeon_w-1270p_firmwarecore_i7-10710u_firmwarecore_i9-11900_firmwarecore_i9-10900_firmwarexeon_gold_5300core_i9-9960xcore_i5-1155g7_firmwarexeon_gold_5218txeon_e-2374gxeon_platinum_8353hxeon_d-1749nt_firmwarecore_i5-1235ucore_i7-9700k_firmwarecore_i5-11260hxeon_d-1557_firmwarexeon_platinum_8280_firmwarexeon_e-2374g_firmwarexeon_gold_5218nxeon_d-2163it_firmwarexeon_silver_4209t_firmwarepentium_gold_g6405u_firmwarexeon_w-2295_firmwarexeon_d-1531core_i7-10875h_firmwarepentium_gold_g6605xeon_silver_4214cxeon_d-1533n_firmwarecore_i9-9900kf_firmwarexeon_silver_4214yxeon_e-2278gexeon_w-10855mxeon_d-2177ntpentium_gold_g6505celeron_g5925xeon_w-3275_firmwarecore_i9-11900kfxeon_d-2786nte_firmwarexeon_platinum_8270_firmwarexeon_gold_6230tcore_i5-10600t_firmwarexeon_silver_4210rxeon_w-1270core_i3-l13g4pentium_gold_g6400core_i5-10300h_firmwarexeon_d-2775te_firmwarexeon_w-3235xeon_d-1573n_firmwarexeon_d-1571_firmwarecore_i9-10900tcore_i7-11700k_firmwarecore_i5-8200ycore_i5-10500t_firmwarecore_i9-10900kcore_i5-10600_firmwarexeon_gold_5220rcore_i7-10700tecore_i7-12700kfxeon_gold_6226r_firmwarexeon_w-11955mcore_i9-12900_firmwarecore_i5-12600h_firmwarecore_i5-10400txeon_w-1290ecore_i5-11400fdebian_linuxceleron_g5925_firmwarecore_i7-1185g7core_i7-9700kfxeon_d-2796texeon_d-1541_firmwareceleron_6600hecore_i9-10900xxeon_d-2798nxxeon_gold_6328hl_firmwarexeon_gold_6256_firmwarexeon_platinum_9221core_i5-12400fcore_i7-1260uxeon_w-1290te_firmwarexeon_d-2142itcore_i9-11980hk_firmwarexeon_platinum_9222_firmwarecore_i5-10110y_firmwarecore_i9-10900te_firmwareceleron_7305_firmwarecore_i9-11900kcore_i9-12900hkcore_i5-12450hcore_i5-10600kfxeon_d-1726xeon_w-10855_firmwareceleron_g6900pentium_gold_g6600_firmwarecore_i7-10700_firmwarexeon_d-1735tr_firmwarecore_i5-1035g1_firmwarecore_i3-1005g1xeon_d-2777nxpentium_gold_8500_firmwarexeon_d-2752nte_firmwarecore_i7-1185gre_firmwarexeon_d-2796nt_firmwarecore_i9-10850hxeon_d-1637core_i5-8210y_firmwarecore_i5-9400fcore_i5-11320h_firmwarecore_i7-10700kf_firmwarexeon_d-1539_firmwarecore_i9-12900core_i7-12650h_firmwarexeon_gold_6238core_i7-1270p_firmwarecore_i5-12500core_i5-11600kfxeon_d-1602core_i5-8365uceleron_g5900_firmwarexeon_platinum_8376hxeon_w-2245xeon_d-2799core_i7-12700xeon_d-1563n_firmwarexeon_d-2145ntxeon_platinum_8256xeon_w-2275_firmwarecore_i5-9600kfcore_i7-12700t_firmwarexeon_e-2288g_firmwarexeon_d-2163itcore_i3-11100he_firmwarepentium_gold_g7400xeon_gold_6254_firmwarecore_i3-1120g4xeon_gold_5220_firmwarecore_i5-12500h_firmwarecore_i5-11400hcore_i9-11900hxeon_w-2235_firmwarexeon_gold_6328hlxeon_d-1623ncore_i7-1185g7exeon_gold_6230n_firmwarecore_i3-12100tcore_i7-10810ucore_i3-10300txeon_silver_4208_firmwarexeon_d-1521core_i5-1130g7xeon_d-1713nt_firmwarexeon_e-2378g_firmwarecore_i9-11900core_i5-9600kcore_i5-8265ucore_i9-9900kfxeon_gold_5218r_firmwarecore_i7-12700kf_firmwarecore_i7-10700txeon_silver_4300core_i3-12100f_firmwarecore_i5-1240p_firmwarecore_i7-9700kf_firmwarecore_i5-1145g7core_i5-9300hxeon_silver_4214y_firmwarecore_i7-10750hcore_i9-10850kpentium_gold_g6405xeon_d-2143itxeon_silver_4209tcore_i7-7640xxeon_d-2753ntpentium_gold_8505_firmwarecore_i7-1160g7_firmwarexeon_w-1390_firmwarexeon_gold_6212uxeon_d-1632_firmwarepentium_gold_g6400tcore_i7-11850h_firmwarexeon_gold_5300_firmwarecore_i9-11900fxeon_d-1612_firmwarexeon_gold_6238m_firmwarexeon_silver_4215xeon_d-2177nt_firmwarexeon_gold_6230ncore_i5-8365u_firmwarecore_i9-10920xcore_i9-11950hxeon_d-1563nxeon_platinum_8280l_firmwarexeon_d-1712tr_firmwarecore_i7-1195g7core_i9-10885hxeon_d-1739_firmwarexeon_e-2386gcore_i7-1165g7core_i5-11400_firmwarexeon_gold_6242_firmwareceleron_6305core_i7-11850hecore_i7-1260p_firmwarecore_i3-1215u_firmwarepentium_gold_g6605_firmwarexeon_d-1733nt_firmwarecore_i7-10750h_firmwarecore_i5-11400xeon_w-1290tecore_i9-9820x_firmwarecore_i5-1145g7ecore_i3-1115gre_firmwarexeon_w-3265_firmwarexeon_d-2142it_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_d-1602_firmwarecore_i5-1230u_firmwarexeon_platinum_8376hl_firmwarexeon_platinum_8360hxeon_d-2733ntcore_i9-10980hkxeon_gold_6230t_firmwarecore_i3-1000g1_firmwarexeon_gold_5218_firmwarexeon_d-1559_firmwarecore_i9-10900t_firmwarecore_i7-10700k_firmwarexeon_silver_4210txeon_w-3275m_firmwarepentium_gold_g6505_firmwarecore_i5-11400f_firmwarecore_i3-10305_firmwarexeon_d-2777nx_firmwarecore_i3-10325_firmwarecore_i7-10510y_firmwareceleron_g5905t_firmwarecore_i9-11900k_firmwarecore_i7-1185g7_firmwarecore_i7-11800h_firmwarexeon_d-2795ntcore_i7-1180g7_firmwareceleron_6600he_firmwarecore_i7-1060g7_firmwarecore_i7-1280pcore_i7-8500yxeon_d-2779xeon_w-3245m_firmwarexeon_platinum_8276_firmwarexeon_gold_6330h_firmwarecore_i9-11900t_firmwarecore_i9-7960xxeon_silver_4214c_firmwarecore_i3-1110g4_firmwarexeon_w-1370xeon_d-1715terxeon_d-1559xeon_platinum_9242_firmwarecore_i5-12600txeon_gold_6258r_firmwarepentium_gold_g6405t_firmwarexeon_platinum_8280m_firmwarexeon_d-1537core_i3-10320_firmwarecore_i7-1260u_firmwarexeon_gold_6230_firmwarexeon_gold_5218bxeon_platinum_8360hl_firmwarexeon_gold_6328hxeon_d-1734nt_firmwarecore_i7-1180g7core_i5-12400xeon_e-2288gxeon_w-1370pxeon_gold_6254xeon_gold_5218rcore_i3-10320xeon_d-2752ntecore_i3-12300t_firmwarecore_i7-1255u_firmwarecore_i3-10105fxeon_w-1390t_firmwarexeon_gold_5215m_firmwarexeon_w-2235xeon_platinum_8260mxeon_gold_5320h_firmwarexeon_d-1649ncore_i7-10875hxeon_w-3225core_i7-1195g7_firmwarexeon_d-1540xeon_d-1736nt_firmwarecore_i3-11100hecore_i5-10400hpentium_gold_7505xeon_d-2712t_firmwarecore_i7-12700kcore_i5-9600kf_firmwarexeon_d-1513nxeon_w-10885mcore_i5-10505_firmwarexeon_gold_6234_firmwarexeon_d-1527core_i5-12600_firmwarecore_i9-9940xpentium_gold_g6500_firmwarecore_i9-9900xxeon_d-2745nxcore_i9-7940xxeon_gold_5220r_firmwarecore_i5-10110ycore_i7-1255uxeon_platinum_8380hlxeon_platinum_9220_firmwarecore_i5-12600hxeon_platinum_8260l_firmwarecore_i7-8500y_firmwarecore_i9-11900kf_firmwarexeon_d-1748te_firmwarexeon_silver_4214core_i7-12700hxeon_w-3235_firmwarexeon_platinum_9222core_i3-10105tcore_i9-9900k_firmwarecore_i5-11300hcore_i7-10510u_firmwareceleron_g5905_firmwarexeon_gold_5220sxeon_platinum_8260core_i7-7800x_firmwarecore_i3-1000g4core_i3-10105t_firmwarecore_i5-10400h_firmwarecore_i9-12900kf_firmwarecore_i9-10900kfcore_i7-11390h_firmwarexeon_d-2146ntxeon_d-1713ntcore_i9-9980hk_firmwarecore_i3-10100tpentium_gold_g6600xeon_d-2752tercore_i9-9980hkcore_i5-12500hxeon_w-1390txeon_silver_4216core_i5-1035g4_firmwarecore_i5-1140g7xeon_d-2757nx_firmwarecore_i7-10610ucore_i7-12700k_firmwarecore_i3-1220p_firmwarecore_i7-9850h_firmwarexeon_platinum_8276lcore_i7-11700kfcore_i7-11700_firmwarecore_i7-7740xxeon_d-2795nt_firmwarexeon_d-1713nte_firmwarecore_i7-11375hcore_i9-10850h_firmwarepentium_gold_g7400_firmwarecore_i5-11500txeon_platinum_9221_firmwarecore_i9-9920x_firmwarecore_i9-12900h_firmwarecore_i5-11400h_firmwarecore_i5-9400xeon_d-1521_firmwarecore_i7-1185grexeon_w-1290t_firmwareceleron_g6900_firmwarexeon_gold_6209u_firmwarecore_i9-7920x_firmwarexeon_platinum_8356h_firmwarecore_i3-10325xeon_e-2356gxeon_d-1557xeon_platinum_8276l_firmwarecore_i5-1145gre_firmwarexeon_platinum_8380hcore_i3-10105f_firmwarexeon_gold_6262v_firmwarecore_i3-1210uxeon_w-3245mcore_i5-12600xeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_e-2334core_i7-9850hcore_i5-12600k_firmwarexeon_w-1350core_i3-10110u_firmwarecore_i5-1035g1xeon_platinum_8276m_firmwarecore_i7-11850hxeon_w-1290core_i9-11900f_firmwarexeon_gold_6226_firmwarexeon_silver_4210core_i3-10110ucore_i7-8665u_firmwarecore_i5-8310y_firmwarecore_i7-1250ucore_i9-10885h_firmwarexeon_e-2314_firmwarexeon_gold_6250l_firmwarexeon_w-2223_firmwarexeon_gold_6234xeon_d-1718t_firmwarecore_i5-11500_firmwarexeon_gold_6252n_firmwarexeon_gold_6240y_firmwarexeon_w-1350pxeon_d-2143it_firmwarexeon_w-1250core_i9-10900core_i7-1065g7_firmwarecore_i9-12900hcore_i5-1145g7_firmwarexeon_w-3245_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i7-11375h_firmwarecore_i3-10300xeon_w-1290p_firmwarexeon_w-1250p_firmwarexeon_bronze_3204_firmwarecore_i9-9960x_firmwarexeon_d-1736ntceleron_g5920core_i7-8565ucore_i9-10940x_firmwarexeon_d-1747ntexeon_bronze_3206r_firmwarecore_i5-11500h_firmwarecore_i5-1240pxeon_silver_4215r_firmwarecore_i7-10870hcore_i7-10510ucore_i3-10100fxeon_w-1290pceleron_5305u_firmwareceleron_6305_firmwarecore_i5-8310ycore_i9-12900txeon_d-1523n_firmwarecore_i5-12500txeon_gold_5217xeon_d-2183it_firmwarecore_i3-10300_firmwarecore_i7-9750hf_firmwarexeon_w-3245core_i5-12600t_firmwarexeon_e-2324gcore_i5-12400_firmwarexeon_gold_6210upentium_gold_8500core_i5-1250pxeon_d-1548_firmwarecore_i5-8265u_firmwarexeon_platinum_8380h_firmwarecore_i5-10210uxeon_d-1528xeon_w-2295core_i5-11300h_firmwarecore_i5-10500core_i7-7740x_firmwarecore_i9-9800xpentium_gold_g6405tceleron_g5900tcore_i7-12800h_firmwarexeon_gold_5215core_i5-11600_firmwarecore_i5-10400t_firmwarecore_i7-12650hxeon_d-1622_firmwarexeon_d-1527_firmwarexeon_d-1531_firmwarecore_i9-7920xxeon_d-1633n_firmwarecore_i3-10100_firmwarecore_i9-7960x_firmwarexeon_d-1513n_firmwarexeon_platinum_8260y_firmwarexeon_d-2798nx_firmwarecore_i5-1030g4_firmwarecore_i9-10900tecore_i5-11600kxeon_e-2378core_i7-7820xcore_i3-1115g4ecore_i5-10600tcore_i5-10600kf_firmwarexeon_d-1747nte_firmwarexeon_platinum_8260m_firmwarexeon_w-3275mcore_i7-7800xxeon_d-1726_firmwarexeon_w-1290_firmwarexeon_e-2386g_firmwarexeon_gold_6250lxeon_gold_6209ucore_i5-9400hcore_i9-10900e_firmwarexeon_d-2191_firmwarexeon_e-2278g_firmwarecore_i9-9920xceleron_g5205u_firmwarexeon_platinum_8253xeon_d-2146nt_firmwarexeon_gold_6252npentium_gold_g6505txeon_e-2278gel_firmwarexeon_d-1518_firmwarexeon_platinum_8376h_firmwarecore_i9-12900k_firmwarexeon_gold_6240mcore_i3-1120g4_firmwarexeon_d-1715ter_firmwarexeon_platinum_8280pentium_gold_g6500txeon_gold_6238l_firmwarexeon_d-2745nx_firmwarecore_i5-1230ucore_i3-10100t_firmwarecore_i7-10700f_firmwarexeon_w-2255_firmwarexeon_gold_5220t_firmwarexeon_gold_6252core_i3-10105core_i5-1140g7_firmwarecore_i3-12300_firmwarecore_i3-1215ucore_i5-11400tcore_i7-11700kxeon_gold_6246core_i9-10900kf_firmwarecore_i7-10810u_firmwarexeon_silver_4214rxeon_w-1350_firmwarecore_i9-10920x_firmwarecore_i9-10940xxeon_platinum_8300_firmwarecore_i9-9880h_firmwarexeon_silver_4210r_firmwarexeon_w-3265m_firmwarexeon_d-1577_firmwarepentium_gold_g6400t_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_platinum_8360hlcore_i7-10700kfxeon_d-1748tecore_i9-12900t_firmwarexeon_platinum_8280mcore_i3-l13g4_firmwarecore_i5-12400t_firmwarexeon_d-2187ntxeon_d-2775teceleron_g5905xeon_d-1518core_i7-1065g7core_i5-11600kf_firmwarexeon_w-1370p_firmwarexeon_silver_4208xeon_gold_5318hxeon_gold_6210u_firmwarexeon_w-1270_firmwarepentium_gold_g7400tcore_i3-1000g1core_i5-1130g7_firmwarexeon_w-2225xeon_silver_4210t_firmwarepentium_gold_7505_firmwarexeon_gold_5218t_firmwarecore_i9-11900h_firmwarecore_i5-9400f_firmwarexeon_e-2356g_firmwarecore_i3-10305t_firmwarexeon_gold_5215lcore_i3-1220pcore_i5-12400txeon_w-10855m_firmwarecore_i7-12700tcore_i9-10850k_firmwarexeon_gold_5217_firmwarexeon_platinum_8253_firmwarexeon_d-1718tcore_i7-10700core_i5-1135g7_firmwarecore_i9-11950h_firmwarexeon_d-2753nt_firmwarecore_i7-1265u_firmwareceleron_7300xeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i3-1115g4_firmwarexeon_d-1533ncore_i5-1145grexeon_w-3265mxeon_gold_6240lxeon_d-1529_firmwarexeon_gold_6248core_i5-1135g7core_i5-11600k_firmwarecore_i9-9940x_firmwarexeon_gold_6258rxeon_d-1712trcore_i3-1115g4xeon_w-1270pxeon_e-2378_firmwarexeon_gold_6240l_firmwarexeon_d-1736_firmwarexeon_platinum_9282core_i5-10400xeon_d-2173itxeon_d-2161ixeon_d-2766ntxeon_w-1250pxeon_silver_4215_firmwarecore_i7-10870h_firmwarecore_i5-1155g7pentium_gold_8505xeon_d-2123itcore_i7-9700kcore_i5-1245u_firmwarecore_i7-11700kf_firmwarepentium_gold_g6405_firmwarecore_i9-12900hk_firmwarexeon_gold_6252_firmwarecore_i7-7640x_firmwarecore_i7-12700fcore_i3-1110g4core_i3-12100fcore_i7-1250u_firmwarexeon_bronze_3206rxeon_d-1722necore_i5-1235u_firmwarexeon_d-2776ntxeon_w-3275xeon_gold_6240xeon_d-2161i_firmwarecore_i5-8200y_firmwarecore_i7-10700te_firmwarecore_i7-10700exeon_gold_5220xeon_platinum_8256_firmwarecore_i7-1260pceleron_g5305uxeon_platinum_9220core_i3-10100texeon_gold_6348h_firmwareceleron_g5205uxeon_e-2388gcore_i5-10210u_firmwarecore_i7-11390hxeon_platinum_8268xeon_d-2786ntexeon_d-1537_firmwarexeon_d-2796te_firmwareceleron_g5905txeon_d-2191xeon_gold_6240rcore_i3-10100te_firmwarexeon_gold_6238_firmwarexeon_gold_6240m_firmwarexeon_gold_6330hxeon_d-1612xeon_silver_4215rcore_i9-12900fxeon_d-1540_firmwarexeon_e-2278gcore_i5-10600k_firmwarecore_i9-10900eceleron_g6900tcore_i9-11980hkxeon_d-1553n_firmwarecore_i5-l16g7_firmwarexeon_w-3265core_m3-8100y_firmwarecore_i5-10500tecore_i7-12700f_firmwarecore_i7-12700_firmwarecore_i5-10210y_firmwarecore_i5-11500core_i7-11700xeon_d-2798ntcore_i5-10500tcore_i5-10600xeon_w-2245_firmwarecore_i5-10500_firmwarecore_i7-1265ucore_i5-10310yxeon_gold_6208uxeon_d-1736xeon_d-2738core_i5-10310y_firmwarexeon_d-1567_firmwarecore_i3-12300pentium_gold_g6500t_firmwarecore_i5-11500t_firmwarexeon_e-2388g_firmwarexeon_gold_6230r_firmwarexeon_d-1749ntxeon_gold_6242pentium_gold_g6405ucore_i7-10700kcore_i3-12300txeon_e-2336xeon_d-1627xeon_gold_6246_firmwarexeon_platinum_8260_firmwarecore_i5-12450h_firmwarexeon_e-2286mcore_i9-9880hcore_i5-1240uxeon_gold_6250_firmwareceleron_7305core_i5-11600t_firmwarexeon_d-1623n_firmwarecore_i7-11370hxeon_gold_6244_firmwarexeon_d-1702xeon_d-1722ne_firmwarecore_i5-12500_firmwarexeon_d-1528_firmwarecore_i5-1035g4core_i5-l16g7core_i5-11500hcore_i9-12900kcore_i5-11600txeon_platinum_8276mxeon_d-1732te_firmwarecore_i5-10200hcore_i9-9900kxeon_platinum_8276xeon_d-1529xeon_gold_6240_firmwarexeon_gold_5220tcore_i3-1210u_firmwarecore_i7-1160g7core_i5-12600kfcore_i5-10400fxeon_gold_6244xeon_w-2265_firmwarexeon_w-3223_firmwarexeon_gold_6242rxeon_e-2324g_firmwarexeon_e-2278ge_firmwarecore_i5-1035g7_firmwarexeon_w-2275pentium_gold_g6400_firmwarexeon_w-10855xeon_w-2265xeon_gold_6226rcore_i5-9400_firmwarexeon_d-1564n_firmwarecore_i3-12100t_firmwarexeon_w-10885m_firmwarexeon_bronze_3204core_i9-12900kfcore_i9-9820xxeon_d-1714xeon_d-1567xeon_e-2286m_firmwarexeon_gold_5218b_firmwarexeon_platinum_8354hxeon_gold_6348hxeon_gold_6248_firmwarecore_i7-11850he_firmwarecore_i7-9750hfxeon_d-2141ixeon_d-1581_firmwarexeon_d-2141i_firmwarexeon_silver_4214r_firmwareceleron_6305e_firmwarecore_i5-1245uxeon_d-2776nt_firmwarecore_i5-1035g7core_i5-9300h_firmwarexeon_d-1734ntxeon_w-11855mxeon_gold_6240yceleron_g5900xeon_gold_6238lxeon_gold_5218n_firmwarexeon_w-1390xeon_gold_6328h_firmwarecore_i7-11700t_firmwarexeon_gold_5318h_firmwarecore_i3-1115grecore_i5-11600core_i7-11700fxeon_d-1587core_i7-8665ucore_i7-1270pcore_i3-10305txeon_d-2183itxeon_d-2123it_firmwarecore_i9-7940x_firmwarecore_i5-12500t_firmwarexeon_w-1370_firmwarexeon_d-1649n_firmwarexeon_d-1524nxeon_d-2712txeon_gold_5320hcore_i5-1240u_firmwarecore_i5-10600kcore_i9-12900f_firmwarecore_i9-7900x_firmwarexeon_gold_5222core_i7-10850hxeon_gold_6256xeon_d-1523ncore_i3-1005g1_firmwarecore_i3-12100_firmwarecore_i9-9900x_firmwarecore_i5-12600kf_firmwarecore_i5-10500te_firmwarexeon_w-1290e_firmwarexeon_d-1520core_i5-1145g7e_firmwarecore_i3-10300t_firmwarexeon_d-2187nt_firmwarexeon_d-1524n_firmwarexeon_w-1390p_firmwarexeon_platinum_8280lxeon_w-11955m_firmwarecore_i3-10100f_firmwarecore_i9-10900f_firmwarecore_m3-8100yxeon_platinum_8356hcore_i7-12700h_firmwarecore_i7-1280p_firmwarexeon_d-1543nxeon_d-1541xeon_d-1543n_firmwarexeon_d-2799_firmwarecore_i7-11700txeon_d-1564nxeon_gold_5222_firmwarexeon_d-1622xeon_d-1520_firmwarexeon_d-1732texeon_platinum_9242celeron_7300_firmwarecore_i7-10700e_firmwarecore_i5-1030g7_firmwarexeon_w-2223pentium_gold_g7400t_firmwarecore_i7-1185g7e_firmwarexeon_gold_6238tcore_i9-11900tcore_i5-11260h_firmwarecore_i5-9400h_firmwarecore_i5-8210ycore_i5-10400f_firmwarecore_i7-1060g7xeon_gold_6240r_firmwarecore_i7-8565u_firmwarexeon_w-11855m_firmwarexeon_gold_6212u_firmwarexeon_gold_6208u_firmwarexeon_gold_6300core_i5-11400t_firmwarexeon_d-1587_firmwarecore_i7-10700t_firmwarexeon_platinum_9282_firmwarexeon_d-2796ntxeon_platinum_8260lxeon_platinum_8270xeon_gold_6250xeon_d-1713ntexeon_d-1739celeron_6305exeon_w-1290txeon_e-2336_firmwarexeon_gold_6226core_i3-10105_firmwarecore_i5-11320hxeon_d-1577xeon_d-1735trxeon_silver_4214_firmwarexeon_platinum_8268_firmwarecore_i7-10850h_firmwarexeon_d-2766nt_firmwarexeon_d-2757nxxeon_e-2314xeon_d-2166ntcore_i3-10305xeon_w-1390pxeon_d-1539xeon_gold_5215mcore_i5-10505core_i5-1250p_firmwarexeon_silver_4300_firmwarecore_i3-12100xeon_platinum_8360h_firmwarexeon_w-2255core_i9-10900x_firmwarexeon_gold_6262vxeon_platinum_8354h_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_d-1746ter_firmwarexeon_d-1581xeon_platinum_8300core_i5-10210ycore_i3-1000g4_firmwarecore_i5-10300hcore_i7-10710ucore_i7-1165g7_firmwarexeon_silver_4210_firmwarexeon_d-1627_firmwarexeon_d-1702_firmwarexeon_platinum_8380hl_firmwarexeon_d-1733ntxeon_gold_5218pentium_gold_g6500xeon_gold_6238mcore_i5-12400f_firmwareceleron_g5920_firmwareceleron_5305uxeon_gold_6238rxeon_w-1250_firmwarecore_i7-11700f_firmwarexeon_d-1653n_firmwarecore_i3-1125g4_firmwarecore_i9-10900fcore_i3-1125g4xeon_e-2278gelxeon_w-3225_firmwarexeon_d-1553ncore_i5-1030g4xeon_gold_6222v_firmwarexeon_e-2378gcore_i5-10200h_firmwarexeon_d-2798nt_firmwarexeon_gold_6238r_firmwarexeon_d-1573ncore_i5-12600kcore_i9-10980hk_firmwarexeon_d-1632xeon_d-2166nt_firmwarecore_i5-10400_firmwarexeon_w-3223xeon_gold_6242r_firmwarecore_i7-12800hceleron_g6900t_firmwarepentium_gold_g6505t_firmwarexeon_platinum_8376hlceleron_g5305u_firmwarexeon_gold_6222vxeon_silver_4216_firmwarexeon_d-1746tercore_i7-10700fxeon_d-1571core_i3-1115g4e_firmwarecore_i5-9600k_firmwarecore_i9-10900k_firmwarexeon_gold_5215l_firmwarexeon_gold_6238t_firmwarexeon_d-2738_firmwarexeon_platinum_8353h_firmwarexeon_w-2225_firmwarexeon_gold_6230xeon_d-1714_firmwareIntel(R) Processors
CVE-2022-25375
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.20% / 42.72%
||
7 Day CHG~0.00%
Published-20 Feb, 2022 | 19:47
Updated-03 Aug, 2024 | 04:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2022-23825
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.23% / 45.54%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 19:27
Updated-16 Sep, 2024 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.VMware (Broadcom Inc.)Fedora ProjectDebian GNU/Linux
Product-epyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareathlon_silver_3050u_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7402epyc_7f32epyc_7551_firmwareepyc_7272_firmwareryzen_3_3100_firmwareryzen_threadripper_2950x_firmwareathlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500ua9-9410_firmwareathlon_x4_940_firmwareepyc_7702ryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareathlon_x4_830_firmwareryzen_3_2300uryzen_5_3600x_firmwareepyc_7542ryzen_7_3750h_firmwareryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7h12_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7f52ryzen_threadripper_pro_5945wxryzen_5_2500u_firmwareepyc_7001ryzen_3_4300g_firmwareryzen_3_3100epyc_7f32_firmwaredebian_linuxepyc_7502ryzen_7_3750hepyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwarea12-9730pryzen_3_2200u_firmwareathlon_x4_840_firmwareepyc_7281ryzen_3_2200uepyc_7551epyc_7551pepyc_7002_firmwareryzen_threadripper_2920xathlon_x4_970a10-9630pepyc_7551p_firmwareathlon_x4_950_firmwareryzen_7_3800xt_firmwareepyc_7601_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xepyc_7352ryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401epyc_7742ryzen_7_2700uepyc_7272ryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geryzen_7_2800hryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_3_4300uryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_5_2600x_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_7_2700_firmwareathlon_x4_835_firmwareryzen_5_3400g_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_4700uryzen_7_3800xa6-9220c_firmwareepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7501athlon_x4_970_firmwareepyc_7301_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_4600hryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_3_3200u_firmwareathlon_x4_750_firmwareathlon_x4_940ryzen_3_3300x_firmwareepyc_7402pepyc_7252_firmwarea4-9120_firmwareryzen_3_3300uepyc_7542_firmwarea6-9210ryzen_threadripper_pro_5945wx_firmwareryzen_3_3300g_firmwareryzen_5_3600xtryzen_5_3450gryzen_5_3550h_firmwareryzen_7_4800hepyc_7252epyc_7502pryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pryzen_9_4900ha12-9700p_firmwareepyc_7351p_firmwarea9-9420fedoraepyc_7302p_firmwareathlon_x4_840ryzen_threadripper_2970wxepyc_7642_firmwareepyc_7452epyc_7h12ryzen_7_3700u_firmwarea6-9220_firmwareathlon_x4_860k_firmwareryzen_5_2600xryzen_7_2700u_firmwareryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gryzen_5_2700epyc_7601epyc_7302ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_7_4700g_firmwareepyc_7552_firmwareryzen_5_3600xepyc_7371epyc_7f72epyc_7662a10-9630p_firmwareryzen_7_3800xtryzen_threadripper_pro_5975wx_firmwareryzen_threadripper_2970wx_firmwareepyc_7642epyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7301ryzen_7_2700xepyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_threadripper_pro_3955wxryzen_3_3200uryzen_7_4700u_firmwareryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830a6-9220cepyc_7302pepyc_7552athlon_silver_3050uathlon_x4_950ryzen_5_4600gepyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwarea6-9210_firmwareathlon_x4_835athlon_x4_845_firmwarea9-9410epyc_7402_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareepyc_7262athlon_x4_845ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxryzen_3_3250uepyc_7251_firmwareepyc_7401_firmwareathlon_gold_3150u_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xepyc_7452_firmwareepyc_7351ryzen_3_3300gryzen_threadripper_pro_3945wxathlon_x4_880kryzen_threadripper_3970x_firmwareryzen_3_3250u_firmwareryzen_5_3500u_firmwareryzen_5_3600ryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_7_4800uepyc_7352_firmwareepyc_7702_firmwareepyc_7532esxiAMD Processors
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2008-1877
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.06% / 17.65%
||
7 Day CHG~0.00%
Published-17 Apr, 2008 | 18:00
Updated-07 Aug, 2024 | 08:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

tss 0.8.1 allows local users to read arbitrary files via the -a parameter, which is processed while tss is running with privileges.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-tssn/a
CWE ID-CWE-264
Not Available
CVE-2008-1945
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.08% / 25.45%
||
7 Day CHG~0.00%
Published-08 Aug, 2008 | 19:00
Updated-07 Aug, 2024 | 08:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.

Action-Not Available
Vendor-n/aSUSEDebian GNU/LinuxRed Hat, Inc.QEMUopenSUSECanonical Ltd.
Product-enterprise_linux_serverubuntu_linuxlinux_enterprise_serverdebian_linuxopensuseenterprise_linux_workstationqemuenterprise_linux_eusenterprise_linux_desktopn/a
CVE-2008-1567
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 11.03%
||
7 Day CHG~0.00%
Published-31 Mar, 2008 | 22:00
Updated-07 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.

Action-Not Available
Vendor-n/aDebian GNU/LinuxopenSUSEphpMyAdminFedora Project
Product-opensusedebian_linuxphpmyadminfedoran/a
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2018-1118
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.3||LOW
EPSS-0.11% / 29.66%
||
7 Day CHG~0.00%
Published-10 May, 2018 | 22:00
Updated-05 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.Canonical Ltd.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlinux_kernelenterprise_linux_workstationvirtualization_hostenterprise_linux_desktopvhost
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-24513
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.88%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:54
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aDebian GNU/LinuxIntel CorporationSiemens AG
Product-atom_c3750atom_x6212reatom_x6211eatom_c3338rceleron_j4025pentium_j4205pentium_silver_n5030atom_x5-a3930atom_c3758rceleron_j6413atom_x5-a3940atom_c3708celeron_n3350pentium_silver_j5005atom_x6413eatom_c3436latom_x6425eatom_c3858p5921bdebian_linuxceleron_n6211simatic_et_200sp_open_controlleratom_c3558rcp5962bpentium_silver_n5000pentium_j6425celeron_j3455celeron_n4000celeron_j3455esimatic_ipc127e_firmwarepentium_n4200eatom_c3336atom_c3958atom_c3830atom_c3538atom_x6425reatom_c3808simatic_et_200sp_open_controller_firmwarepentium_n6415atom_c3955atom_x6427feceleron_n3450celeron_n4020celeron_j4105simatic_drive_controller_firmwareatom_c3850atom_x5-a3960core_i3-l13g4celeron_n4100atom_c3950atom_x6200fesimatic_drive_controlleratom_c3558celeron_j4005p5931batom_c3308celeron_j3355pentium_n4200atom_c3508simatic_ipc127eatom_p5942bpentium_silver_j5040core_i5-l16g7celeron_n4120celeron_n3350eatom_c3338atom_c3758celeron_j3355eatom_c3558rceleron_j4125atom_x5-a3950Intel Atom(R) Processors
CVE-2007-6206
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.08% / 23.30%
||
7 Day CHG~0.00%
Published-04 Dec, 2007 | 00:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSEDebian GNU/LinuxRed Hat, Inc.openSUSECanonical Ltd.
Product-enterprise_linux_serverubuntu_linuxlinux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_kerneldebian_linuxopensuseenterprise_linux_workstationenterprise_linux_euslinux_enterprise_desktopenterprise_linux_desktopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-24512
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.05% / 13.72%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:53
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.Debian GNU/Linux
Product-solidfire_biosdebian_linuxfas\/aff_bioshci_compute_node_biosmicrocodeIntel(R) Processors
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-24511
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 16.42%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:53
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.Debian GNU/Linux
Product-solidfire_biosdebian_linuxfas\/aff_bioshci_compute_node_biosmicrocodeIntel(R) Processors
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2020-16150
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 26.91%
||
7 Day CHG-0.01%
Published-02 Sep, 2020 | 00:00
Updated-04 Aug, 2024 | 13:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Lucky 13 timing side channel in mbedtls_ssl_decrypt_buf in library/ssl_msg.c in Trusted Firmware Mbed TLS through 2.23.0 allows an attacker to recover secret key information. This affects CBC mode because of a computed time difference based on a padding length.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-17490
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.85%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 07:29
Updated-04 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.

Action-Not Available
Vendor-saltstackn/aDebian GNU/Linux
Product-debian_linuxsaltn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-8631
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.88%
||
7 Day CHG~0.00%
Published-05 Feb, 2020 | 13:39
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSEDebian GNU/Linux
Product-cloud-initdebian_linuxleapn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-4569
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.38%
||
7 Day CHG~0.00%
Published-28 Aug, 2023 | 21:46
Updated-27 Feb, 2025 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: information leak in nft_set_catchall_flush in net/netfilter/nf_tables_api.c

A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.

Action-Not Available
Vendor-n/aDebian GNU/LinuxLinux Kernel Organization, IncRed Hat, Inc.Fedora Project
Product-debian_linuxlinux_kernelenterprise_linuxRed Hat Enterprise Linux 9FedoraRed Hat Enterprise Linux 7KernelRed Hat Enterprise Linux 8Red Hat Enterprise Linux 6
CWE ID-CWE-402
Transmission of Private Resources into a New Sphere ('Resource Leak')
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2012-5474
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.05%
||
7 Day CHG~0.00%
Published-30 Dec, 2019 | 19:36
Updated-06 Aug, 2024 | 21:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The file /etc/openstack-dashboard/local_settings within Red Hat OpenStack Platform 2.0 and RHOS Essex Release (python-django-horizon package before 2012.1.1) is world readable and exposes the secret key value.

Action-Not Available
Vendor-python-django-horizonDebian GNU/LinuxOpenStackFedora ProjectRed Hat, Inc.
Product-horizondebian_linuxopenstackfedorapython-django-horizon
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2012-5476
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.15% / 35.62%
||
7 Day CHG~0.00%
Published-30 Dec, 2019 | 19:02
Updated-06 Aug, 2024 | 21:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Within the RHOS Essex Preview (2012.2) of the OpenStack dashboard package, the file /etc/quantum/quantum.conf is world readable which exposes the admin password and token value.

Action-Not Available
Vendor-Debian GNU/LinuxOpenStack
Product-horizondebian_linuxopenstack-dashboard
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-21127
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.20% / 42.31%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 20:02
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aXen ProjectDebian GNU/LinuxIntel Corporation
Product-debian_linuxsgx_dcapsgx_pswsgx_sdkxenIntel(R) Processors
CWE ID-CWE-459
Incomplete Cleanup
CVE-2020-29660
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.11% / 29.79%
||
7 Day CHG~0.00%
Published-09 Dec, 2020 | 16:57
Updated-04 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, IncBroadcom Inc.NetApp, Inc.Debian GNU/Linux
Product-a700s_firmwarea400_firmwareactive_iq_unified_managerh410c_firmware8300_firmwaresolidfire_baseboard_management_controller8300debian_linuxlinux_kernel8700a400fedoraa700sh410cfabric_operating_systemsolidfire_baseboard_management_controller_firmware8700_firmwaren/a
CWE ID-CWE-416
Use After Free
CWE ID-CWE-667
Improper Locking
CVE-2020-14330
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.12% / 32.08%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 00:00
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.
Product-ansible_enginedebian_linuxAnsible
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2012-0844
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.15% / 35.62%
||
7 Day CHG~0.00%
Published-21 Feb, 2020 | 17:42
Updated-06 Aug, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information-disclosure vulnerability in Netsurf through 2.8 due to a world-readable cookie jar.

Action-Not Available
Vendor-netsurf-browsernetsurfDebian GNU/Linux
Product-netsurfdebian_linuxnetsurf
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2012-1096
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.35% / 56.87%
||
7 Day CHG~0.00%
Published-10 Mar, 2020 | 16:36
Updated-06 Aug, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NetworkManager 0.9 and earlier allows local users to use other users' certificates or private keys when making a connection via the file path when adding a new connection.

Action-Not Available
Vendor-The GNOME ProjectDebian GNU/Linux
Product-networkmanagerdebian_linuxNetworkManager
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-14347
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.51%
||
7 Day CHG~0.00%
Published-05 Aug, 2020 | 13:08
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.

Action-Not Available
Vendor-Debian GNU/LinuxCanonical Ltd.X.Org Foundation
Product-ubuntu_linuxdebian_linuxxorg-serverxorg-x11-server
CWE ID-CWE-665
Improper Initialization
CVE-2020-1472
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-94.45% / 99.99%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:13
Updated-30 Jul, 2025 | 01:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2020-09-21||Apply updates per vendor instructions.
Netlogon Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.

Action-Not Available
Vendor-Oracle CorporationFedora ProjectSynology, Inc.SambaMicrosoft CorporationopenSUSECanonical Ltd.Debian GNU/Linux
Product-windows_server_2004ubuntu_linuxwindows_server_2016windows_server_2012debian_linuxsambawindows_server_1903windows_server_20h2fedorazfs_storage_appliance_kitdirectory_serverwindows_server_1909windows_server_2019windows_server_2008leapWindows Server version 20H2Windows Server, version 1909 (Server Core installation)Windows Server 2016Windows Server 2019 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2016 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows Server version 2004Windows Server 2012Windows Server 2008 R2 Service Pack 1Windows Server 2019Windows Server 2012 R2Windows Server 2012 (Server Core installation)Netlogon
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-14332
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 34.21%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 17:59
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.
Product-ansible_enginedebian_linuxAnsible
CWE ID-CWE-117
Improper Output Neutralization for Logs
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2022-21123
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.32% / 54.80%
||
7 Day CHG+0.01%
Published-15 Jun, 2022 | 19:59
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aXen ProjectVMware (Broadcom Inc.)Debian GNU/LinuxIntel CorporationFedora Project
Product-esxidebian_linuxsgx_dcapsgx_pswsgx_sdkfedoraxenIntel(R) Processors
CWE ID-CWE-459
Incomplete Cleanup
CVE-2011-4915
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 24.37%
||
7 Day CHG~0.00%
Published-20 Feb, 2020 | 17:03
Updated-07 Aug, 2024 | 00:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelLinux kernel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-13397
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 23.02%
||
7 Day CHG~0.00%
Published-22 May, 2020 | 00:00
Updated-04 Aug, 2024 | 12:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSEFreeRDPDebian GNU/Linux
Product-freerdpubuntu_linuxdebian_linuxleapn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-11740
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.70%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 12:18
Updated-04 Aug, 2024 | 11:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.

Action-Not Available
Vendor-n/aFedora ProjectDebian GNU/LinuxopenSUSEXen Project
Product-xendebian_linuxfedoraleapn/a
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found