Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-3956

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-04 Jun, 2014 | 10:00
Updated At-06 Aug, 2024 | 10:57
Rejected At-
Credits

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:04 Jun, 2014 | 10:00
Updated At:06 Aug, 2024 | 10:57
Rejected At:
▼CVE Numbering Authority (CNA)

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368
x_refsource_CONFIRM
http://secunia.com/advisories/58628
third-party-advisory
x_refsource_SECUNIA
http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
vendor-advisory
x_refsource_FREEBSD
http://www.mandriva.com/security/advisories?name=MDVSA-2015:128
vendor-advisory
x_refsource_MANDRIVA
http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
x_refsource_MISC
ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-201412-32.xml
vendor-advisory
x_refsource_GENTOO
http://www.sendmail.com/sm/open_source/download/8.14.9/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
vendor-advisory
x_refsource_SUSE
http://www.mandriva.com/security/advisories?name=MDVSA-2014:147
vendor-advisory
x_refsource_MANDRIVA
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
vendor-advisory
x_refsource_FEDORA
http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/57455
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/67791
vdb-entry
x_refsource_BID
http://advisories.mageia.org/MGASA-2014-0270.html
x_refsource_CONFIRM
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
vendor-advisory
x_refsource_SLACKWARE
http://www.securitytracker.com/id/1030331
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/58628
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:128
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
Resource:
x_refsource_MISC
Hyperlink: ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
Resource:
x_refsource_CONFIRM
Hyperlink: http://security.gentoo.org/glsa/glsa-201412-32.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.sendmail.com/sm/open_source/download/8.14.9/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:147
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/57455
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/67791
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://advisories.mageia.org/MGASA-2014-0270.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.securitytracker.com/id/1030331
Resource:
vdb-entry
x_refsource_SECTRACK
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/58628
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2015:128
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
x_refsource_MISC
x_transferred
ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
x_refsource_CONFIRM
x_transferred
http://security.gentoo.org/glsa/glsa-201412-32.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.sendmail.com/sm/open_source/download/8.14.9/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2014:147
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/57455
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/67791
vdb-entry
x_refsource_BID
x_transferred
http://advisories.mageia.org/MGASA-2014-0270.html
x_refsource_CONFIRM
x_transferred
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.securitytracker.com/id/1030331
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/58628
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:128
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201412-32.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.sendmail.com/sm/open_source/download/8.14.9/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:147
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/57455
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/67791
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://advisories.mageia.org/MGASA-2014-0270.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.securitytracker.com/id/1030331
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:04 Jun, 2014 | 11:19
Updated At:12 Apr, 2025 | 10:46

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

FreeBSD Foundation
freebsd
>>freebsd>>Versions up to 9.2(inclusive)
cpe:2.3:o:freebsd:freebsd:*:-:*:*:*:*:*:*
HP Inc.
hp
>>hpux>>Versions up to b.11.31(inclusive)
cpe:2.3:a:hp:hpux:*:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>20
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>Versions up to 8.14.8(inclusive)
cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.6.7
cpe:2.3:a:sendmail:sendmail:8.6.7:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.7.6
cpe:2.3:a:sendmail:sendmail:8.7.6:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.7.7
cpe:2.3:a:sendmail:sendmail:8.7.7:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.7.8
cpe:2.3:a:sendmail:sendmail:8.7.8:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.7.9
cpe:2.3:a:sendmail:sendmail:8.7.9:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.7.10
cpe:2.3:a:sendmail:sendmail:8.7.10:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.8.8
cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.9.0
cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.9.1
cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.9.2
cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.9.3
cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.10
cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.10.0
cpe:2.3:a:sendmail:sendmail:8.10.0:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.10.1
cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.10.2
cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.11.0
cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.11.1
cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.11.2
cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.11.3
cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.11.4
cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.11.5
cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.11.6
cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.11.7
cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.0
cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.1
cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.2
cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.3
cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.4
cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.5
cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.6
cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.7
cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.8
cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.9
cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.10
cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.12.11
cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.0
cpe:2.3:a:sendmail:sendmail:8.13.0:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.1
cpe:2.3:a:sendmail:sendmail:8.13.1:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.2
cpe:2.3:a:sendmail:sendmail:8.13.2:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.3
cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.4
cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.5
cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.6
cpe:2.3:a:sendmail:sendmail:8.13.6:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.7
cpe:2.3:a:sendmail:sendmail:8.13.7:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.13.8
cpe:2.3:a:sendmail:sendmail:8.13.8:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.14.0
cpe:2.3:a:sendmail:sendmail:8.14.0:*:*:*:*:*:*:*
sendmail
sendmail
>>sendmail>>8.14.1
cpe:2.3:a:sendmail:sendmail:8.14.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE ID: CWE-200
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTEScve@mitre.org
Vendor Advisory
http://advisories.mageia.org/MGASA-2014-0270.htmlcve@mitre.org
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.htmlcve@mitre.org
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.htmlcve@mitre.org
N/A
http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.htmlcve@mitre.org
Third Party Advisory
VDB Entry
http://secunia.com/advisories/57455cve@mitre.org
N/A
http://secunia.com/advisories/58628cve@mitre.org
N/A
http://security.gentoo.org/glsa/glsa-201412-32.xmlcve@mitre.org
N/A
http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asccve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2014:147cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:128cve@mitre.org
N/A
http://www.securityfocus.com/bid/67791cve@mitre.org
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1030331cve@mitre.org
Third Party Advisory
VDB Entry
http://www.sendmail.com/sm/open_source/download/8.14.9/cve@mitre.org
Patch
Vendor Advisory
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644cve@mitre.org
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368cve@mitre.org
Third Party Advisory
ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTESaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://advisories.mageia.org/MGASA-2014-0270.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://secunia.com/advisories/57455af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/58628af854a3a-2127-422b-91ae-364da2661108
N/A
http://security.gentoo.org/glsa/glsa-201412-32.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2014:147af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:128af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/67791af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1030331af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.sendmail.com/sm/open_source/download/8.14.9/af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644af854a3a-2127-422b-91ae-364da2661108
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://advisories.mageia.org/MGASA-2014-0270.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://secunia.com/advisories/57455
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/58628
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-201412-32.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:147
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:128
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/67791
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1030331
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.sendmail.com/sm/open_source/download/8.14.9/
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://advisories.mageia.org/MGASA-2014-0270.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://secunia.com/advisories/57455
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/58628
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-201412-32.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:147
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:128
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/67791
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1030331
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.sendmail.com/sm/open_source/download/8.14.9/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

493Records found

CVE-2011-1074
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.02% / 3.88%
||
7 Day CHG~0.00%
Published-04 Mar, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

crontab.c in crontab in FreeBSD allows local users to determine the existence of arbitrary directories via a command-line argument composed of a directory name concatenated with a directory traversal sequence that leads to the /etc/crontab pathname.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-18660
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.04% / 8.83%
||
7 Day CHG~0.00%
Published-27 Nov, 2019 | 22:11
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

Action-Not Available
Vendor-n/aFedora ProjectCanonical Ltd.Red Hat, Inc.openSUSELinux Kernel Organization, Inc
Product-ubuntu_linuxlinux_kernelenterprise_linuxfedoraleapn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-29901
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.09% / 26.76%
||
7 Day CHG-0.02%
Published-12 Jul, 2022 | 00:00
Updated-03 Aug, 2024 | 06:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

Action-Not Available
Vendor-Debian GNU/LinuxIntel CorporationVMware (Broadcom Inc.)Xen ProjectFedora Project
Product-core_i7-6920hqcore_i3-6167u_firmwarecore_i7-8705gcore_i7-8665ucore_i3-6100ucore_i3-8300tcore_i7-8510y_firmwarecore_i7-6700_firmwarecore_i7-6600ucore_i3-6100u_firmwarecore_i7-8706gcore_i3-8120_firmwarecore_i3-6300core_i5-8600_firmwarecore_i7-6510u_firmwarecore_i7-8565u_firmwarecore_i7-6822eq_firmwarecore_i3-6100e_firmwarecore_i3-8350k_firmwarecore_i7-8700t_firmwarecore_i5-8305g_firmwarecore_i3-6167ucore_i5-8500bcore_i5-6310ucore_i5-8269ucore_i5-8259u_firmwarecore_i5-8400hcore_i3-6300tcore_i7-8700core_i3-6120core_i5-8400core_i7-8705g_firmwarecore_i5-8400b_firmwarecore_i5-6300hq_firmwarecore_i7-6700t_firmwarecore_i3-8100_firmwarecore_i7-8709g_firmwarecore_i7-6500ucore_i7-6600u_firmwarecore_i7-6500u_firmwarecore_i7-6770hqcore_i3-6320core_i7-6700kcore_i7-8700kcore_i3-8000core_i3-8120core_i7-6650u_firmwarecore_i7-8560u_firmwarecore_i7-6820eq_firmwarecore_i5-8500t_firmwaredebian_linuxcore_i7-8670core_i7-8560ucore_i3-8145ucore_i5-8300h_firmwarecore_i5-8600k_firmwarecore_i7-6822eqcore_i3-8130u_firmwarecore_i3-8000tcore_i7-6700tecore_i5-6400tcore_i7-6567u_firmwarecore_i5-6300ucore_i3-8109ucore_i7-8565ucore_m5-6y57core_i3-6100t_firmwarecore_i5-8250ucore_i7-8569u_firmwarecore_i7-8706g_firmwarecore_i5-6442eq_firmwarecore_i7-6920hq_firmwarecore_i5-8269u_firmwarecore_i5-6600k_firmwarecore_i5-8550ucore_i3-6110u_firmwarecore_i3-6100hcore_i5-6287u_firmwarecore_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259ucore_i5-8210y_firmwarecore_m5-6y54core_i5-6442eqcore_i5-6600kcore_i5-8420tcore_i5-6500core_i7-8650u_firmwarecore_i3-6300_firmwarecore_i5-8400bcore_i7-8850h_firmwarecore_m7-6y75_firmwarecore_i5-6200ucore_i7-8670t_firmwarecore_i7-6700hq_firmwarecore_i7-6700hqcore_m3-8100ycore_i5-6500te_firmwarecore_i3-8100hcore_i5-8650_firmwarecore_i5-8250u_firmwarecore_i7-6870hqcore_i5-8400_firmwarecore_i5-6350hqcore_i5-8550core_i7-6970hq_firmwarecore_i7-8670_firmwarecore_i5-8400h_firmwarecore_i7-6970hqcore_i7-6660u_firmwarecore_i7-6820hkcore_i5-8350ucore_i3-6100te_firmwarecore_i3-6320t_firmwarecore_i3-6120tcore_i5-6440hq_firmwarecore_m3-6y30_firmwarecore_i5-6350hq_firmwarecore_i5-8600core_i7-8550ucore_i5-8400t_firmwarecore_i5-8500tcore_i7-8500y_firmwarecore_i3-6102ecore_i3-6120_firmwarecore_i5-6400t_firmwarecore_i5-8365u_firmwarecore_i5-6310u_firmwarecore_i7-6700te_firmwarecore_i3-8100core_i5-6400core_i5-8310y_firmwarecore_i5-6600tcore_i3-8020core_i7-6650ucore_i7-6510ucore_i5-6360u_firmwarecore_i3-8100h_firmwarecore_i5-6400_firmwarecore_m7-6y75core_i5-6600t_firmwarecore_i5-8350u_firmwarecore_m3-6y30core_i5-6210ucore_i7-8700b_firmwarefedoracore_i7-8559u_firmwarecore_i7-8850hcore_i9-8950hkcore_i5-8265u_firmwarecore_i7-8665u_firmwarecore_i7-6560u_firmwarecore_i7-6820hq_firmwarecore_i3-6100tcore_i7-6820eqcore_i3-6320_firmwarecore_i3-8300_firmwarecore_i7-8500ycore_i5-8600kcore_i3-8145u_firmwarecore_i7-8700k_firmwarecore_i5-8400tcore_i5-8650core_i7-8700_firmwarecore_i7-8750hcore_i3-6100_firmwarecore_i5-6500tecore_i5-8365ucore_i5-8420core_i7-8670tcore_i7-6700tcore_i5-6260u_firmwarecore_i5-8210ycore_i7-6660ucore_i5-8500b_firmwarecore_i7-8750h_firmwarecore_i5-8500_firmwarecore_i3-6100h_firmwarecore_i3-6100ecore_i3-8300t_firmwarecore_i3-8109u_firmwarecore_i5-6210u_firmwarecore_i5-6300u_firmwarecore_i3-6120t_firmwarecore_i7-8809g_firmwarecore_i7-8557u_firmwarecore_m5-6y57_firmwarecore_i7-8750hfcore_i5-6500_firmwarecore_i5-8550_firmwarecore_i5-8420t_firmwarecore_i5-6500t_firmwarecore_i3-8300core_i7-6567ucore_i5-8200ycore_i7-8750hf_firmwarecore_i3-6100core_i5-8310ycore_i7-8809gcore_i9-8950hk_firmwarecore_i5-8500core_i7-6870hq_firmwarecore_i3-8000_firmwarecore_m5-6y54_firmwarecore_i5-6360ucore_i3-6320tcore_i7-8700bcore_i7-8709gcore_i5-8420_firmwarecore_i3-6300t_firmwarecore_i7-8550u_firmwarecore_i3-8000t_firmwarecore_i5-6287ucore_i5-8200y_firmwarecore_i5-8550u_firmwarecore_i5-8650kcore_i7-8510ycore_i7-8569ucore_i5-6267u_firmwarexencore_i7-6770hq_firmwarecore_i5-8265ucore_i3-6110ucore_i3-8100tcore_i5-6267ucore_i5-6300hqcore_m3-8100y_firmwarecore_i3-8020_firmwarecore_i5-6260ucore_i5-6440hqcore_i5-6500tcore_i7-6700k_firmwarecore_i5-8650k_firmwarecore_i7-8557ucore_i7-6560ucore_i7-6700core_i7-6820hk_firmwarecore_i7-8700tcore_i3-8350kcore_i5-6440eqcore_i5-8300hcore_i7-6820hqcore_i5-6440eq_firmwarecore_i5-8600t_firmwarecore_i5-8305gcore_i5-8600tcore_i7-8559ucore_i7-8650ucore_i3-6100tecore_i5-6600_firmwarecore_i3-8130ucore_i5-6600esxicore_i3-6102e_firmwareIntel Microprocessors
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2020-1740
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-3.9||LOW
EPSS-0.04% / 8.68%
||
7 Day CHG~0.00%
Published-16 Mar, 2020 | 15:07
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Fedora Project
Product-cloudforms_management_enginedebian_linuxopenstackfedoraansibleansible_toweransible
CWE ID-CWE-377
Insecure Temporary File
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-1073
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-04 Mar, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

crontab.c in crontab in FreeBSD and Apple Mac OS X allows local users to (1) determine the existence of arbitrary files via a symlink attack on a /tmp/crontab.XXXXXXXXXX temporary file and (2) perform MD5 checksum comparisons on arbitrary pairs of files via two symlink attacks on /tmp/crontab.XXXXXXXXXX temporary files.

Action-Not Available
Vendor-n/aFreeBSD FoundationApple Inc.
Product-freebsdmac_os_xn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2010-3282
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-3.3||LOW
EPSS-0.05% / 13.51%
||
7 Day CHG~0.00%
Published-09 Jan, 2020 | 20:52
Updated-07 Aug, 2024 | 03:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.

Action-Not Available
Vendor-HPHP Inc.Fedora ProjectRed Hat, Inc.
Product-redhat_directory_serverhp-ux_directory_server389_directory_serverdirectory_server389 Directory ServerHP-UX Directory Server
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-1999-0078
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.14% / 34.53%
||
7 Day CHG~0.00%
Published-04 Feb, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.

Action-Not Available
Vendor-ncrbsdisconextn/aFreeBSD FoundationHP Inc.Silicon Graphics, Inc.NEC CorporationSun Microsystems (Oracle Corporation)IBM Corporation
Product-bsd_oshp-uxaixopenserverup-ux_vmp-rasirixunixwaresunosfreebsdnextstepn/a
CVE-2021-23239
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.5||LOW
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-12 Jan, 2021 | 00:00
Updated-03 Aug, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

Action-Not Available
Vendor-sudo_projectn/aNetApp, Inc.Debian GNU/LinuxFedora Project
Product-debian_linuxcloud_backuphci_management_nodefedorasolidfiresudon/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-2745
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.1||MEDIUM
EPSS-0.06% / 19.59%
||
7 Day CHG~0.00%
Published-23 Jul, 2019 | 22:31
Updated-01 Oct, 2024 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSEMcAfee, LLCHP Inc.Oracle Corporation
Product-ubuntu_linuxdebian_linuxepolicy_orchestratorxp7_command_viewjrejdkleapJava
CVE-2019-18222
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.06% / 19.42%
||
7 Day CHG~0.00%
Published-23 Jan, 2020 | 00:00
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedorambed_crypton/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-7119
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7||HIGH
EPSS-0.26% / 49.13%
||
7 Day CHG~0.00%
Published-10 May, 2019 | 18:21
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Local Disclosure of Sensitive Information vulnerability was identified in HPE NonStop Safeguard earlier than version SPR T9750L01^AIC or T9750H05^AIH, and later versions when the PASSWORD-PROMPT configuration attribute is not set to BLIND; all versions on H-series. STDSEC-STANDARD SECURITY PROD All prior versions before T6533L01^ADU or T6533H05^ADW, and later versions when the PASSWORD-PROMPT configuration attribute is not set to BLIND and all versions on H-series . Note that some commands in NonStop Safeguard and NonStop Standard Security software require username and password to be passed as command line parameters, which may lead to a local disclosure of the credentials.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-nonstop_standard_security_j_seriesnonstop_safeguard_j_seriesnonstop_standard_security_h_seriesnonstop_safeguard_h_seriesnonstop_standard_security_l_seriesnonstop_safeguard_l_seriesNonStop SAFEGAURD and NonStop H-series STDSEC-STANDARD SECURITY Product
CVE-2018-10846
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 5.24%
||
7 Day CHG~0.00%
Published-22 Aug, 2018 | 13:00
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

Action-Not Available
Vendor-[UNKNOWN]Canonical Ltd.GNUFedora ProjectRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_workstationfedoragnutlsenterprise_linux_desktopgnutls
CWE ID-CWE-385
Covert Timing Channel
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2016-0371
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-01 Feb, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled.

Action-Not Available
Vendor-Linux Kernel Organization, IncOracle CorporationHP Inc.Apple Inc.IBM CorporationMicrosoft Corporation
Product-tivoli_storage_manageraixsolarismac_os_xlinux_kernelhp-uxwindowsTivoli Storage Manager
CVE-2020-27170
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.05% / 14.84%
||
7 Day CHG~0.00%
Published-20 Mar, 2021 | 21:30
Updated-04 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-2374
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.1||MEDIUM
EPSS-0.16% / 37.88%
||
7 Day CHG~0.00%
Published-20 Jul, 2021 | 22:43
Updated-26 Sep, 2024 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-NetApp, Inc.Oracle CorporationFedora Project
Product-fedoramysql_serveroncommand_insightMySQL Server
CVE-2020-24612
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.37%
||
7 Day CHG~0.00%
Published-24 Aug, 2020 | 20:46
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the selinux-policy (aka Reference Policy) package 3.14 through 2020-08-24 because the .config/Yubico directory is mishandled. Consequently, when SELinux is in enforced mode, pam-u2f is not allowed to read the user's U2F configuration file. If configured with the nouserok option (the default when configured by the authselect tool), and that file cannot be read, the second factor is disabled. An attacker with only the knowledge of the password can then log in, bypassing 2FA.

Action-Not Available
Vendor-n/aFedora Project
Product-selinux-policyn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-4788
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-5.1||MEDIUM
EPSS-0.20% / 42.02%
||
7 Day CHG~0.00%
Published-20 Nov, 2020 | 03:45
Updated-16 Sep, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.

Action-Not Available
Vendor-Oracle CorporationFedora ProjectIBM Corporation
Product-viosfedoracommunications_cloud_native_core_network_exposure_functioncommunications_cloud_native_core_binding_support_functionpower9aixcommunications_cloud_native_core_policyVIOSAIX
CVE-2020-15095
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 12.52%
||
7 Day CHG~0.00%
Published-07 Jul, 2020 | 18:55
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive information exposure through logs in npm cli

Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files.

Action-Not Available
Vendor-npmjsnpmopenSUSEFedora Project
Product-fedoranpmleapcli
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2020-10932
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.03% / 5.70%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 00:00
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. An attacker that can get precise enough side-channel measurements can recover the long-term ECDSA private key by (1) reconstructing the projective coordinate of the result of scalar multiplication by exploiting side channels in the conversion to affine coordinates; (2) using an attack described by Naccache, Smart, and Stern in 2003 to recover a few bits of the ephemeral scalar from those projective coordinates via several measurements; and (3) using a lattice attack to get from there to the long-term ECDSA private key used for the signatures. Typically an attacker would have sufficient access when attacking an SGX enclave and controlling the untrusted OS.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedoran/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-203
Observable Discrepancy
CVE-2017-8952
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.5||HIGH
EPSS-2.60% / 85.02%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 23:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-sitescopeSiteScope
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8950
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.5||MEDIUM
EPSS-0.60% / 68.41%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-17 Sep, 2024 | 00:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-sitescopeSiteScope
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8978
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-4.6||MEDIUM
EPSS-0.24% / 47.36%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Unauthorized Disclosure of Information vulnerability in HPE IceWall Products version MFA 4.0 proxy was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-icewall_ssoicewall_mfaicewall_mcrpIceWall Products
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8951
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.40% / 60.11%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-sitescopeSiteScope
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8985
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 26.24%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HPE XP Storage using Hitachi Global Link Manager (HGLM) has a local authenticated information disclosure vulnerability in HGLM version HGLM 6.3.0-00 to 8.5.2-00.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-xp_storage_hitachi_global_link_managerXP Storage using HGLM
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8980
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.5||HIGH
EPSS-2.19% / 83.72%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-17 Sep, 2024 | 02:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Disclosure of Information vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-intelligent_management_centerIntelligent Management Center (iMC) PLAT
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8970
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.76% / 72.34%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-17 Sep, 2024 | 00:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unauthenticated disclosure of information vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-matrix_operating_environmentMatrix Operating Environment
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8360
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.22% / 44.20%
||
7 Day CHG~0.00%
Published-12 May, 2017 | 06:54
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process.

Action-Not Available
Vendor-conexantn/aHP Inc.Microsoft Corporation
Product-windows_7elitebook_725_g3probook_446_g3zbook_15_g3probook_655_g2probook_470_g3elitebook_820_g3probook_645_g2windows_10probook_440_g3zbook_15u_g3elitebook_848_g3probook_640_g2zbook_17_g3mictray64elitebook_755_g3elitebook_828_g3elitebook_745_g3elitebook_folio_1040_g3elitebook_850_g3elite_x2_1012_g1zbook_studio_g3elitebook_840_g3elitebook_1030_g1probook_430_g3probook_455_g3probook_450_g3probook_650_g2elitebook_folio_g1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2013-5209
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.63% / 69.27%
||
7 Day CHG~0.00%
Published-29 Aug, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-1999-1136
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.13% / 32.68%
||
7 Day CHG~0.00%
Published-09 Mar, 2002 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in Predictive on HP-UX 11.0 and earlier, and MPE/iX 5.5 and earlier, allows attackers to compromise data transfer for Predictive messages (using e-mail or modem) between customer and Response Center Predictive systems.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxmpe_ixn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5811
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.5||HIGH
EPSS-14.79% / 94.25%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-17 Sep, 2024 | 00:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-network_automationNetwork Automation
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5803
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.5||HIGH
EPSS-7.60% / 91.47%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-17 Sep, 2024 | 01:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Disclosure of Information vulnerability in HPE NonStop Servers using SSH Service version L series: T0801L02 through T0801L02^ABX; J and H series: T0801H01 through T0801H01^ACA was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-nonstop_server_softwarenonstop_serverNonStop Servers using SSH Service
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-5601
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-6.5||MEDIUM
EPSS-0.31% / 53.63%
||
7 Day CHG~0.00%
Published-03 Jul, 2019 | 18:51
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.0-STABLE before r347474, 12.0-RELEASE before 12.0-RELEASE-p7, 11.2-STABLE before r347475, and 11.2-RELEASE before 11.2-RELEASE-p11, a bug in the FFS implementation causes up to three bytes of kernel stack memory to be written to disk as uninitialized directory entry padding.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5795
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.5||MEDIUM
EPSS-0.59% / 68.20%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 22:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Local Arbitrary File Download vulnerability in HPE Intelligent Management Center (IMC) version PLAT 7.2 E0403P06 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-intelligent_management_centerIntelligent Management Center (IMC) PLAT
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-2480
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.42% / 60.82%
||
7 Day CHG~0.00%
Published-27 Nov, 2019 | 18:53
Updated-06 Aug, 2024 | 23:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information Disclosure vulnerability in the 802.11 stack, as used in FreeBSD before 8.2 and NetBSD when using certain non-x86 architectures. A signedness error in the IEEE80211_IOC_CHANINFO ioctl allows a local unprivileged user to cause the kernel to copy large amounts of kernel memory back to the user, disclosing potentially sensitive information.

Action-Not Available
Vendor-NetBSDFreeBSD Foundation
Product-freebsdnetbsdFreeBSDNetBSD
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2013-4829
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-1.5||LOW
EPSS-0.06% / 17.29%
||
7 Day CHG~0.00%
Published-04 Oct, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP LaserJet M4555, M525, and M725; LaserJet flow MFP M525c; LaserJet Enterprise color flow MFP M575c; Color LaserJet CM4540, M575, and M775; and ScanJet Enterprise 8500fn1 FutureSmart devices allow local users to read images of arbitrary scanned documents via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-color_laserjet_cm4540fcolor_laserjet_cm4540fskmcolor_laserjet_cm4540color_laserjet_m775dnlaserjet_m725z\+laserjet_m725flaserjet_m4555fskmlaserjet_m525dnlaserjet_enterprise_color_flow_m575claserjet_m725zlaserjet_flow_m525ccolor_laserjet_m775zlaserjet_m725dncolor_laserjet_m775flaserjet_m4555color_laserjet_m575flaserjet_m4555flaserjet_m4555hlaserjet_m525fcolor_laserjet_m575dnscanjet_enterprise_8500fn1color_laserjet_m775z\+n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5801
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.5||HIGH
EPSS-5.54% / 89.89%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Unauthorized Access to Data vulnerability in HPE Business Process Monitor version v09.2x, v09.30 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-business_process_monitorBusiness Process Monitor
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5788
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.5||MEDIUM
EPSS-0.22% / 44.13%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Local Disclosure of Sensitive Information vulnerability in HPE NonStop Software Essentials version T0894 T0894H02 through T0894H02^AAI was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-nonstop_server_softwarenonstop_serverNonStop Software Essentials
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5797
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.5||HIGH
EPSS-2.16% / 83.59%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Unauthenticated Disclosure of Information vulnerability in HPE Intelligent Management Center (IMC) SOM version v7.3 (E0501) was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-intelligent_management_centerIntelligent Management Center (IMC)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-2744
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.17% / 38.03%
||
7 Day CHG~0.00%
Published-23 Jan, 2018 | 16:00
Updated-17 Sep, 2024 | 04:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vulnerability allows attacker to extract binaries into protected file system locations in HP Support Assistant before 12.7.26.1.

Action-Not Available
Vendor-HP Inc.
Product-support_assistantHP Support Assistant
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2013-4826
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-5||MEDIUM
EPSS-77.23% / 98.93%
||
7 Day CHG~0.00%
Published-13 Oct, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to obtain sensitive information via unknown vectors, aka ZDI-CAN-1647.

Action-Not Available
Vendor-n/aHP Inc.
Product-imc_service_operation_management_software_moduleintelligent_management_centern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2013-5666
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.07% / 21.37%
||
7 Day CHG~0.00%
Published-23 Sep, 2013 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-44141
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.31% / 53.51%
||
7 Day CHG~0.00%
Published-21 Feb, 2022 | 00:00
Updated-04 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.

Action-Not Available
Vendor-n/aSambaFedora ProjectRed Hat, Inc.
Product-storagefedorasambaSamba
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2020-1739
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.9||LOW
EPSS-0.14% / 34.32%
||
7 Day CHG+0.09%
Published-12 Mar, 2020 | 17:47
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Fedora Project
Product-cloudforms_management_enginedebian_linuxopenstackfedoraansibleansible_towerAnsible
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-6331
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-3.3||LOW
EPSS-0.08% / 24.46%
||
7 Day CHG~0.00%
Published-09 Jan, 2020 | 18:28
Updated-04 Aug, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was found in Samsung Mobile Print (Android) versions prior to 4.08.007. A potential security vulnerability caused by incomplete obfuscation of application configuration information.

Action-Not Available
Vendor-n/aHP Inc.
Product-samsung_mobile_printSamsung Mobile Print (Android)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-1753
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.04% / 10.34%
||
7 Day CHG~0.00%
Published-16 Mar, 2020 | 14:37
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Fedora Project
Product-ansible_engineansible_towerdebian_linuxfedoraAnsible
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CWE ID-CWE-214
Invocation of Process Using Visible Sensitive Information
CVE-2017-17556
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-0.13% / 33.27%
||
7 Day CHG~0.00%
Published-15 Dec, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A debug tool in Synaptics TouchPad drivers allows local users with administrative access to obtain sensitive information about keyboard scan codes by modifying registry keys.

Action-Not Available
Vendor-n/aHP Inc.
Product-synaptics_touchpad_drivern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-41092
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.08% / 23.64%
||
7 Day CHG~0.00%
Published-04 Oct, 2021 | 20:10
Updated-04 Aug, 2024 | 02:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Docker CLI leaks private registry credentials to registry-1.docker.io

Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.

Action-Not Available
Vendor-Fedora ProjectDocker, Inc.
Product-fedoracommand_line_interfacecli
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2017-1086
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-3.3||LOW
EPSS-0.07% / 23.02%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p4, 11.0-RELEASE-p15, 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24, not all information in the struct ptrace_lwpinfo is relevant for the state of any thread, and the kernel does not fill the irrelevant bytes or short strings. Since the structure filled by the kernel is allocated on the kernel stack and copied to userspace, a leak of information of the kernel stack of the thread is possible from the debugger. As a result, some bytes from the kernel stack of the thread using ptrace (PT_LWPINFO) call can be observed in userspace.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-4023
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 25.95%
||
7 Day CHG~0.00%
Published-09 Mar, 2022 | 16:49
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the io-workqueue implementation in the Linux kernel versions prior to 5.15-rc1. The kernel can panic when an improper cancellation operation triggers the submission of new io-uring operations during a shortage of free space. This flaw allows a local user with permissions to execute io-uring requests to possibly crash the system.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, Inc
Product-fedoralinux_kernelkernel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2013-2322
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-3.5||LOW
EPSS-0.24% / 46.93%
||
7 Day CHG~0.00%
Published-28 Jun, 2013 | 14:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP SQL/MX 3.2 and earlier on NonStop servers, when SQL/MP Objects are used, allows remote authenticated users to obtain sensitive information via unspecified vectors, aka the "SQL/MP index" issue.

Action-Not Available
Vendor-n/aHP Inc.
Product-nonstop_sql\/mxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 9
  • 10
  • Next
Details not found