Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-0138

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-15 Apr, 2014 | 14:00
Updated At-06 Aug, 2024 | 09:05
Rejected At-
Credits

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:15 Apr, 2014 | 14:00
Updated At:06 Aug, 2024 | 09:05
Rejected At:
â–¼CVE Numbering Authority (CNA)

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862
x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
x_refsource_CONFIRM
http://curl.haxx.se/docs/adv_20140326A.html
x_refsource_CONFIRM
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
x_refsource_CONFIRM
http://secunia.com/advisories/57836
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/534161/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.debian.org/security/2014/dsa-2902
vendor-advisory
x_refsource_DEBIAN
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
x_refsource_CONFIRM
http://secunia.com/advisories/59458
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/58615
third-party-advisory
x_refsource_SECUNIA
http://seclists.org/fulldisclosure/2014/Dec/23
mailing-list
x_refsource_FULLDISC
http://secunia.com/advisories/57968
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21675820
x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-2167-1
vendor-advisory
x_refsource_UBUNTU
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
x_refsource_CONFIRM
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
x_refsource_CONFIRM
http://secunia.com/advisories/57966
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://curl.haxx.se/docs/adv_20140326A.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/57836
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/534161/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.debian.org/security/2014/dsa-2902
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59458
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/58615
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://seclists.org/fulldisclosure/2014/Dec/23
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://secunia.com/advisories/57968
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21675820
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ubuntu.com/usn/USN-2167-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/57966
Resource:
third-party-advisory
x_refsource_SECUNIA
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
x_refsource_CONFIRM
x_transferred
http://curl.haxx.se/docs/adv_20140326A.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/57836
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/534161/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.debian.org/security/2014/dsa-2902
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59458
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/58615
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://seclists.org/fulldisclosure/2014/Dec/23
mailing-list
x_refsource_FULLDISC
x_transferred
http://secunia.com/advisories/57968
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21675820
x_refsource_CONFIRM
x_transferred
http://www.ubuntu.com/usn/USN-2167-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
x_refsource_CONFIRM
x_transferred
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/57966
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://curl.haxx.se/docs/adv_20140326A.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/57836
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/534161/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.debian.org/security/2014/dsa-2902
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59458
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/58615
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2014/Dec/23
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://secunia.com/advisories/57968
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21675820
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-2167-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/57966
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:15 Apr, 2014 | 14:55
Updated At:06 May, 2026 | 22:30

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.4MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
Type: Primary
Version: 2.0
Base score: 6.4
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

CURL
haxx
>>curl>>7.10.6
cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.10.7
cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.10.8
cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.11.0
cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.11.1
cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.11.2
cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.12.0
cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.12.1
cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.12.2
cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.12.3
cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.13.0
cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.13.1
cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.13.2
cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.14.0
cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.14.1
cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.15.0
cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.15.1
cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.15.2
cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.15.3
cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.15.4
cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.15.5
cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.16.0
cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.16.1
cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.16.2
cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.16.3
cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.16.4
cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.17.0
cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.17.1
cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.18.0
cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.18.1
cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.18.2
cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.19.0
cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.19.1
cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.19.2
cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.19.3
cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.19.4
cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.19.5
cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.19.6
cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.19.7
cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.20.0
cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.20.1
cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.21.0
cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.21.1
cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.21.2
cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.21.3
cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.21.4
cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.21.5
cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.21.6
cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.21.7
cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
CURL
haxx
>>curl>>7.22.0
cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://curl.haxx.se/docs/adv_20140326A.htmlsecalert@redhat.com
Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.htmlsecalert@redhat.com
N/A
http://seclists.org/fulldisclosure/2014/Dec/23secalert@redhat.com
N/A
http://secunia.com/advisories/57836secalert@redhat.com
N/A
http://secunia.com/advisories/57966secalert@redhat.com
N/A
http://secunia.com/advisories/57968secalert@redhat.com
N/A
http://secunia.com/advisories/58615secalert@redhat.com
N/A
http://secunia.com/advisories/59458secalert@redhat.com
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21675820secalert@redhat.com
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862secalert@redhat.com
N/A
http://www.debian.org/security/2014/dsa-2902secalert@redhat.com
N/A
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/secalert@redhat.com
N/A
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/secalert@redhat.com
N/A
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/secalert@redhat.com
N/A
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/534161/100/0/threadedsecalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-2167-1secalert@redhat.com
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0012.htmlsecalert@redhat.com
N/A
http://curl.haxx.se/docs/adv_20140326A.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://seclists.org/fulldisclosure/2014/Dec/23af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/57836af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/57966af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/57968af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/58615af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59458af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21675820af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2014/dsa-2902af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/534161/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2167-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0012.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://curl.haxx.se/docs/adv_20140326A.html
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2014/Dec/23
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/57836
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/57966
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/57968
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/58615
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/59458
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21675820
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-2902
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/534161/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2167-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://curl.haxx.se/docs/adv_20140326A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2014/Dec/23
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/57836
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/57966
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/57968
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/58615
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59458
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21675820
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-2902
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/534161/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2167-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

210Records found

CVE-2021-3850
Matching Score-10
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-10
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-9.1||CRITICAL
EPSS-0.27% / 50.75%
||
7 Day CHG~0.00%
Published-25 Jan, 2022 | 14:20
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass by Primary Weakness in adodb/adodb

Authentication Bypass by Primary Weakness in GitHub repository adodb/adodb prior to 5.20.21.

Action-Not Available
Vendor-adodb_projectadodbDebian GNU/Linux
Product-debian_linuxadodbadodb/adodb
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CWE ID-CWE-287
Improper Authentication
CVE-2019-14870
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-4.67% / 89.37%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 00:00
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSESambaFedora ProjectRed Hat, Inc.
Product-ubuntu_linuxdebian_linuxsambafedoraleapsamba
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-287
Improper Authentication
CVE-2018-10933
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-78.33% / 99.04%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 12:00
Updated-05 Aug, 2024 | 07:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

Action-Not Available
Vendor-libssh[UNKNOWN]Red Hat, Inc.Oracle CorporationNetApp, Inc.Canonical Ltd.Debian GNU/Linux
Product-ubuntu_linuxdebian_linuxenterprise_linuxstorage_automation_storeoncommand_workflow_automationoncommand_unified_managerlibsshmysql_workbenchsnapcenterlibssh
CWE ID-CWE-592
DEPRECATED: Authentication Bypass Issues
CWE ID-CWE-287
Improper Authentication
CVE-2018-7556
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.29% / 52.23%
||
7 Day CHG~0.00%
Published-28 Feb, 2018 | 07:00
Updated-05 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LimeSurvey 2.6.x before 2.6.7, 2.7x.x before 2.73.1, and 3.x before 3.4.2 mishandles application/controller/InstallerController.php after installation, which allows remote attackers to access the configuration file.

Action-Not Available
Vendor-limesurveyn/aDebian GNU/Linux
Product-limesurveydebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-6596
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.55% / 68.10%
||
7 Day CHG~0.00%
Published-03 Feb, 2018 | 21:00
Updated-05 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events.

Action-Not Available
Vendor-django-anymail_projectn/aDebian GNU/Linux
Product-django-anymaildebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-31081
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.53% / 67.32%
||
7 Day CHG+0.05%
Published-27 Jun, 2022 | 00:00
Updated-22 Apr, 2025 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in HTTP::Daemon

HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be rejected.

Action-Not Available
Vendor-http\libwww-perlDebian GNU/Linux
Product-\debian_linuxHTTP-Daemon
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2022-26499
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.66% / 71.11%
||
7 Day CHG~0.00%
Published-15 Apr, 2022 | 00:00
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An SSRF issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it's possible to send arbitrary requests (such as GET) to interfaces such as localhost by using the Identity header. This is fixed in 16.25.2, 18.11.2, and 19.3.2.

Action-Not Available
Vendor-n/aDebian GNU/LinuxDigium, Inc.
Product-asteriskdebian_linuxn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-23959
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.35% / 57.07%
||
7 Day CHG~0.00%
Published-26 Jan, 2022 | 00:38
Updated-03 Aug, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.

Action-Not Available
Vendor-varnish-softwarevarnish_cache_projectn/aDebian GNU/LinuxFedora Project
Product-varnish_cachedebian_linuxfedoravarnish_cache_plusvarnich_cachen/a
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2022-24301
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 50.59%
||
7 Day CHG~0.00%
Published-02 Feb, 2022 | 06:00
Updated-03 Aug, 2024 | 04:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.

Action-Not Available
Vendor-minetestn/aDebian GNU/Linux
Product-minetestdebian_linuxn/a
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2017-2666
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-1.39% / 80.49%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 14:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

Action-Not Available
Vendor-[UNKNOWN]Debian GNU/LinuxRed Hat, Inc.
Product-jboss_enterprise_application_platformundertowdebian_linuxenterprise_linuxundertow
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2021-43400
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.17% / 38.17%
||
7 Day CHG~0.00%
Published-04 Nov, 2021 | 00:00
Updated-04 Nov, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call.

Action-Not Available
Vendor-n/aDebian GNU/LinuxBlueZ
Product-debian_linuxbluezn/a
CWE ID-CWE-416
Use After Free
CVE-2020-26116
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.90% / 75.79%
||
7 Day CHG-0.11%
Published-27 Sep, 2020 | 00:00
Updated-04 Aug, 2024 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSENetApp, Inc.Python Software FoundationOracle CorporationDebian GNU/LinuxFedora Project
Product-ubuntu_linuxdebian_linuxhci_storage_nodefedorazfs_storage_appliance_kithci_compute_nodepythonsolidfireleapn/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2020-26137
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.34% / 56.79%
||
7 Day CHG+0.07%
Published-29 Sep, 2020 | 00:00
Updated-04 Aug, 2024 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

Action-Not Available
Vendor-n/aOracle CorporationDebian GNU/LinuxCanonical Ltd.Python Software Foundation
Product-ubuntu_linuxdebian_linuxcommunications_cloud_native_core_network_function_cloud_native_environmentzfs_storage_appliance_kiturllib3n/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2013-0155
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-18.17% / 95.22%
||
7 Day CHG~0.00%
Published-13 Jan, 2013 | 22:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.

Action-Not Available
Vendor-n/aRuby on RailsDebian GNU/Linux
Product-ruby_on_railsdebian_linuxrailsn/a
CVE-2012-3363
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-55.12% / 98.07%
||
7 Day CHG~0.00%
Published-13 Feb, 2013 | 17:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.

Action-Not Available
Vendor-n/aPerforce Software, Inc.Debian GNU/LinuxFedora Project
Product-zend_frameworkdebian_linuxfedoran/a
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2012-2239
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-9.1||CRITICAL
EPSS-0.35% / 57.54%
||
7 Day CHG~0.00%
Published-24 Nov, 2012 | 20:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mahara 1.4.x before 1.4.4 and 1.5.x before 1.5.3 allows remote attackers to read arbitrary files or create TCP connections via an XML external entity (XXE) injection attack, as demonstrated by reading config.php.

Action-Not Available
Vendor-n/aDebian GNU/LinuxMahara
Product-debian_linuxmaharan/a
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2011-1408
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.2||HIGH
EPSS-0.61% / 69.74%
||
7 Day CHG~0.00%
Published-29 Oct, 2019 | 19:51
Updated-06 Aug, 2024 | 22:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ikiwiki before 3.20110608 allows remote attackers to hijack root's tty and run symlink attacks.

Action-Not Available
Vendor-ikiwikin/aDebian GNU/Linux
Product-ikiwikidebian_linuxn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2020-11987
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-8.2||HIGH
EPSS-1.36% / 80.24%
||
7 Day CHG~0.00%
Published-24 Feb, 2021 | 00:00
Updated-03 Nov, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

Action-Not Available
Vendor-n/aFedora ProjectThe Apache Software FoundationOracle CorporationDebian GNU/Linux
Product-fusion_middleware_mapviewerbanking_apisinsurance_policy_administrationflexcube_universal_bankinginstantis_enterprisetrackretail_back_officeretail_point-of-serviceretail_central_officecommunications_offline_mediation_controllerretail_order_brokerretail_order_management_system_cloud_serviceagile_engineering_data_managementcommunications_application_session_controllerdebian_linuxbanking_digital_experiencebatikcommunications_metasolv_solutionproduct_lifecycle_analyticsfedoraenterprise_repositoryweblogic_serverretail_returns_managementApache Batik
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2009-5042
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.37% / 58.97%
||
7 Day CHG~0.00%
Published-31 Oct, 2019 | 15:40
Updated-07 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

python-docutils allows insecure usage of temporary files

Action-Not Available
Vendor-python-docutils_projectn/aDebian GNU/Linux
Product-python-docutilsdebian_linuxn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2019-9948
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.92% / 76.03%
||
7 Day CHG-0.04%
Published-23 Mar, 2019 | 17:07
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSERed Hat, Inc.Python Software FoundationDebian GNU/LinuxFedora Project
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_server_eusenterprise_linux_workstationfedoraenterprise_linux_eusenterprise_linux_desktoppythonenterprise_linux_tusleapn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2009-0932
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-5.61% / 90.37%
||
7 Day CHG~0.00%
Published-17 Mar, 2009 | 21:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-horde_groupwarehorden/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-20445
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-2.65% / 85.85%
||
7 Day CHG-0.18%
Published-29 Jan, 2020 | 20:33
Updated-05 Aug, 2024 | 02:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.

Action-Not Available
Vendor-n/aThe Netty ProjectRed Hat, Inc.The Apache Software FoundationDebian GNU/LinuxFedora ProjectCanonical Ltd.
Product-ubuntu_linuxsparkdebian_linuxnettyjboss_amq_clientsfedoraenterprise_linuxjboss_enterprise_application_platformn/a
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-20444
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-14.03% / 94.37%
||
7 Day CHG-0.85%
Published-29 Jan, 2020 | 20:33
Updated-01 Jul, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."

Action-Not Available
Vendor-n/aDebian GNU/LinuxThe Netty ProjectRed Hat, Inc.Fedora ProjectCanonical Ltd.
Product-fedoranettyjboss_enterprise_application_platformjboss_amq_clientsdebian_linuxubuntu_linuxenterprise_linuxn/a
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2016-5018
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-9.1||CRITICAL
EPSS-0.94% / 76.28%
||
7 Day CHG~0.00%
Published-10 Aug, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.

Action-Not Available
Vendor-Debian GNU/LinuxCanonical Ltd.Red Hat, Inc.The Apache Software FoundationOracle CorporationNetApp, Inc.
Product-enterprise_linux_desktoptekelec_platform_distributionenterprise_linux_server_tusenterprise_linux_eusenterprise_linux_workstationjboss_enterprise_application_platformtomcatoncommand_shiftdebian_linuxsnap_creator_frameworkenterprise_linux_serverubuntu_linuxenterprise_linux_server_ausjboss_enterprise_web_serveroncommand_insightApache Tomcat
CVE-2016-3167
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.63% / 70.41%
||
7 Day CHG~0.00%
Published-12 Apr, 2016 | 15:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in the drupal_goto function in Drupal 6.x before 6.38, when used with PHP before 5.4.7, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a double-encoded URL in the "destination" parameter.

Action-Not Available
Vendor-n/aThe Drupal AssociationThe PHP GroupDebian GNU/Linux
Product-drupaldebian_linuxphpn/a
CVE-2021-36740
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.71% / 72.27%
||
7 Day CHG~0.00%
Published-14 Jul, 2021 | 16:07
Updated-04 Aug, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.

Action-Not Available
Vendor-varnish-softwarevarnish-cachevarnish_cache_projectn/aDebian GNU/LinuxFedora Project
Product-varnish_cachedebian_linuxfedoran/a
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-16789
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.88% / 75.48%
||
7 Day CHG~0.00%
Published-26 Dec, 2019 | 16:40
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.

Action-Not Available
Vendor-agendalessPylonsOracle CorporationRed Hat, Inc.Fedora ProjectDebian GNU/Linux
Product-debian_linuxcommunications_cloud_native_core_network_function_cloud_native_environmentopenstackfedorawaitressWaitress
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-10197
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-4.79% / 89.52%
||
7 Day CHG~0.00%
Published-03 Sep, 2019 | 14:50
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxSamba
Product-ubuntu_linuxdebian_linuxsambasamba
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-3114
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 30.46%
||
7 Day CHG~0.00%
Published-26 Jan, 2021 | 02:23
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectGoDebian GNU/Linux
Product-debian_linuxcloud_insights_telegraf_agentfedoragostoragegridn/a
CWE ID-CWE-682
Incorrect Calculation
CVE-2021-21311
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.2||HIGH
EPSS-94.18% / 99.92%
||
7 Day CHG~0.00%
Published-11 Feb, 2021 | 20:55
Updated-24 Oct, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-10-20||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
SSRF in adminer

Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.

Action-Not Available
Vendor-AdminerDebian GNU/LinuxAdminer
Product-adminerdebian_linuxadminerAdminer
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-22959
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.46%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 14:45
Updated-30 Apr, 2025 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.

Action-Not Available
Vendor-llhttpNode.js (OpenJS Foundation)Oracle CorporationDebian GNU/Linux
Product-llhttpdebian_linuxgraalvmNode
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2020-8287
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-6.5||MEDIUM
EPSS-11.87% / 93.77%
||
7 Day CHG~0.00%
Published-06 Jan, 2021 | 00:00
Updated-30 Apr, 2025 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.

Action-Not Available
Vendor-Node.js (OpenJS Foundation)Oracle CorporationSiemens AGFedora ProjectDebian GNU/Linux
Product-sinec_infrastructure_network_servicesdebian_linuxgraalvmfedoranode.jsNode
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2014-3694
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-1.27% / 79.59%
||
7 Day CHG~0.00%
Published-29 Oct, 2014 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSEDebian GNU/LinuxPidgin
Product-pidgindebian_linuxubuntu_linuxopensusen/a
CVE-2013-2625
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.09%
||
7 Day CHG~0.00%
Published-27 Nov, 2019 | 18:08
Updated-06 Aug, 2024 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Access Bypass issue exists in OTRS Help Desk before 3.2.4, 3.1.14, and 3.0.19, OTRS ITSM before 3.2.3, 3.1.8, and 3.0.7, and FAQ before 2.2.3, 2.1.4, and 2.0.8. Access rights by the object linking mechanism is not verified

Action-Not Available
Vendor-n/aDebian GNU/LinuxOTRS AGopenSUSE
Product-debian_linuxotrs_itsmopensusefaqotrs_help_deskn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2018-1000132
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.60% / 69.52%
||
7 Day CHG~0.00%
Published-14 Mar, 2018 | 13:00
Updated-05 Aug, 2024 | 12:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1.

Action-Not Available
Vendor-mercurialn/aDebian GNU/Linux
Product-mercurialdebian_linuxn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-0486
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-6.5||MEDIUM
EPSS-0.78% / 73.73%
||
7 Day CHG~0.00%
Published-13 Jan, 2018 | 18:00
Updated-05 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Shibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD.

Action-Not Available
Vendor-shibbolethn/aDebian GNU/Linux
Product-debian_linuxxmltooling-cXMLTooling-C before 1.6.3
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2018-0489
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-6.5||MEDIUM
EPSS-0.84% / 74.80%
||
7 Day CHG~0.00%
Published-27 Feb, 2018 | 15:00
Updated-05 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Shibboleth XMLTooling-C before 1.6.4, as used in Shibboleth Service Provider before 2.6.1.4 on Windows and other products, mishandles digital signatures of user data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via crafted XML data. NOTE: this issue exists because of an incomplete fix for CVE-2018-0486.

Action-Not Available
Vendor-shibbolethn/aDebian GNU/LinuxAruba Networks
Product-clearpassdebian_linuxxmltooling-cShibboleth XMLTooling-C before 1.6.4
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2017-8805
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-9.1||CRITICAL
EPSS-0.30% / 53.32%
||
7 Day CHG~0.00%
Published-17 Oct, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Debian ftpsync before 20171017 does not use the rsync --safe-links option, which allows remote attackers to conduct directory traversal attacks via a crafted upstream mirror.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-ftpsyncDebian ftpsync before 20171017
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-12523
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.56% / 68.25%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 16:39
Updated-04 Aug, 2024 | 23:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.

Action-Not Available
Vendor-n/aopenSUSESquid CacheCanonical Ltd.Debian GNU/LinuxFedora Project
Product-ubuntu_linuxdebian_linuxsquidfedoraleapn/a
CVE-2020-7069
Matching Score-8
Assigner-PHP Group
ShareView Details
Matching Score-8
Assigner-PHP Group
CVSS Score-5.4||MEDIUM
EPSS-8.35% / 92.32%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 14:14
Updated-17 Sep, 2024 | 04:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV

In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.

Action-Not Available
Vendor-Tenable, Inc.Oracle CorporationopenSUSEFedora ProjectNetApp, Inc.Canonical Ltd.Debian GNU/LinuxThe PHP Group
Product-communications_diameter_signaling_routerubuntu_linuxphpclustered_data_ontapdebian_linuxfedoratenable.scleapPHP
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2007-6601
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.87% / 75.26%
||
7 Day CHG~0.00%
Published-09 Jan, 2008 | 21:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21, when local trust or ident authentication is used, allows remote attackers to gain privileges via unspecified vectors. NOTE: this issue exists because of an incomplete fix for CVE-2007-3278.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectThe PostgreSQL Global Development Group
Product-postgresqldebian_linuxfedoran/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-52160
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-4.17% / 88.74%
||
7 Day CHG~0.00%
Published-22 Feb, 2024 | 00:00
Updated-04 Nov, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

Action-Not Available
Vendor-w1.fin/aFedora ProjectGoogle LLCLinux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.
Product-wpa_supplicantenterprise_linuxdebian_linuxlinux_kernelfedoraandroidchrome_osn/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-15224
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-3.1||LOW
EPSS-0.08% / 24.21%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 10:08
Updated-20 Jan, 2026 | 14:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
libssh key passphrase bypass without agent set

When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-287
Improper Authentication
CVE-2018-7750
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-13.83% / 94.32%
||
7 Day CHG~0.00%
Published-13 Mar, 2018 | 18:00
Updated-05 Aug, 2024 | 06:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.

Action-Not Available
Vendor-paramikon/aDebian GNU/LinuxRed Hat, Inc.
Product-enterprise_linux_servervirtualizationdebian_linuxenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationcloudformsparamikoenterprise_linux_server_tusenterprise_linux_desktopansible_enginen/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-16947
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.49% / 81.12%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 01:00
Updated-05 Aug, 2024 | 10:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. The backup tape controller (butc) process accepts incoming RPCs but does not require (or allow for) authentication of those RPCs. Handling those RPCs results in operations being performed with administrator credentials, including dumping/restoring volume contents and manipulating the backup database. For example, an unauthenticated attacker can replace any volume's content with arbitrary data.

Action-Not Available
Vendor-openafsn/aDebian GNU/Linux
Product-openafsdebian_linuxn/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-10861
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.58% / 68.96%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 14:00
Updated-16 Sep, 2024 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.

Action-Not Available
Vendor-cephDebian GNU/LinuxRed Hat, Inc.openSUSE
Product-ceph_storageenterprise_linux_serverdebian_linuxenterprise_linux_workstationceph_storage_monceph_storage_osdenterprise_linux_desktopcephleapceph
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-287
Improper Authentication
CVE-2018-1106
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.48%
||
7 Day CHG~0.00%
Published-23 Apr, 2018 | 20:00
Updated-16 Sep, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.

Action-Not Available
Vendor-packagekit_projectCanonical Ltd.Red Hat, Inc.Debian GNU/Linux
Product-packagekitenterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopPackageKit
CWE ID-CWE-287
Improper Authentication
CVE-2018-1128
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.98% / 76.83%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 14:00
Updated-16 Sep, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.openSUSE
Product-ceph_storageenterprise_linux_serverdebian_linuxenterprise_linux_workstationenterprise_linuxceph_storage_monceph_storage_osdenterprise_linux_desktopcephleapceph
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CWE ID-CWE-287
Improper Authentication
CVE-2022-23134
Matching Score-6
Assigner-Zabbix
ShareView Details
Matching Score-6
Assigner-Zabbix
CVSS Score-3.7||LOW
EPSS-92.61% / 99.75%
||
7 Day CHG-0.49%
Published-13 Jan, 2022 | 15:50
Updated-30 Oct, 2025 | 20:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-08||Apply updates per vendor instructions.
Possible view of the setup pages by unauthenticated users if config file already exists

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

Action-Not Available
Vendor-Fedora ProjectDebian GNU/LinuxZABBIX
Product-fedoradebian_linuxzabbixFrontendFrontend
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2022-22576
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-8.1||HIGH
EPSS-0.34% / 56.57%
||
7 Day CHG~0.00%
Published-26 May, 2022 | 00:00
Updated-16 Apr, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).

Action-Not Available
Vendor-n/aDebian GNU/LinuxSplunk LLC (Cisco Systems, Inc.)Brocade Communications Systems, Inc. (Broadcom Inc.)NetApp, Inc.CURL
Product-solidfire_\&_hci_management_nodeh700s_firmwarecurlsolidfire_\&_hci_storage_nodeclustered_data_ontaph500s_firmwareh410s_firmwareh500sh700sdebian_linuxfabric_operating_systemh300suniversal_forwarderh300s_firmwarehci_compute_nodebootstrap_osh410shttps://github.com/curl/curl
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found