Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-16883

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-19 Dec, 2018 | 14:00
Updated At-05 Aug, 2024 | 10:32
Rejected At-
Credits

sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "allowed_uids" configuration parameter. If sensitive information were stored in the user directory, this could be inadvertently disclosed to local attackers.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:19 Dec, 2018 | 14:00
Updated At:05 Aug, 2024 | 10:32
Rejected At:
▼CVE Numbering Authority (CNA)

sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "allowed_uids" configuration parameter. If sensitive information were stored in the user directory, this could be inadvertently disclosed to local attackers.

Affected Products
Vendor
[UNKNOWN]
Product
sssd
Versions
Affected
  • 2.0.0
Problem Types
TypeCWE IDDescription
CWECWE-200CWE-200
Type: CWE
CWE ID: CWE-200
Description: CWE-200
Metrics
VersionBase scoreBase severityVector
3.02.5LOW
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Version: 3.0
Base score: 2.5
Base severity: LOW
Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/106264
vdb-entry
x_refsource_BID
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16883
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/106264
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16883
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/106264
vdb-entry
x_refsource_BID
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16883
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/106264
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16883
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:19 Dec, 2018 | 14:29
Updated At:09 Oct, 2019 | 23:36

sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "allowed_uids" configuration parameter. If sensitive information were stored in the user directory, this could be inadvertently disclosed to local attackers.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.05.5MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Secondary3.02.5LOW
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.0
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.0
Base score: 2.5
Base severity: LOW
Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Fedora Project
fedoraproject
>>sssd>>Versions from 1.13.0(inclusive) to 2.0.0(exclusive)
cpe:2.3:a:fedoraproject:sssd:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE-200Secondarysecalert@redhat.com
CWE ID: CWE-200
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-200
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/106264secalert@redhat.com
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16883secalert@redhat.com
Issue Tracking
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/106264
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16883
Source: secalert@redhat.com
Resource:
Issue Tracking
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1111Records found

CVE-2012-1105
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.15% / 35.42%
||
7 Day CHG~0.00%
Published-05 Dec, 2019 | 18:26
Updated-06 Aug, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Information Disclosure vulnerability exists in the Jasig Project php-pear-CAS 1.2.2 package in the /tmp directory. The Central Authentication Service client library archives the debug logging file in an insecure manner.

Action-Not Available
Vendor-apereoJasig ProjectDebian GNU/LinuxFedora Project
Product-phpcasdebian_linuxfedoraphp-pear-CAS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-20320
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 26.03%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 17:50
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, IncRed Hat, Inc.
Product-fedoralinux_kernelenterprise_linuxkernel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-6494
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.80%
||
7 Day CHG~0.00%
Published-03 Oct, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.

Action-Not Available
Vendor-n/aFedora ProjectMongoDB, Inc.
Product-mongodbfedoran/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-4482
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.03% / 10.03%
||
7 Day CHG~0.00%
Published-23 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectNovellCanonical Ltd.
Product-suse_linux_enterprise_real_time_extensionsuse_linux_enterprise_workstation_extensionsuse_linux_enterprise_debuginfolinux_kernelfedorasuse_linux_enterprise_live_patchingubuntu_linuxsuse_linux_enterprise_serversuse_linux_enterprise_desktopsuse_linux_enterprise_module_for_public_cloudsuse_linux_enterprise_software_development_kitn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-4158
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.20% / 41.65%
||
7 Day CHG~0.00%
Published-30 Dec, 2010 | 18:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

Action-Not Available
Vendor-n/aopenSUSELinux Kernel Organization, IncSUSEFedora Project
Product-linux_enterprise_desktoplinux_enterprise_real_time_extensionlinux_enterprise_serverfedoralinux_kernellinux_enterprise_software_development_kitopensusen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-13033
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.07% / 21.66%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 17:30
Updated-04 Aug, 2024 | 23:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In CISOfy Lynis 2.x through 2.7.5, the license key can be obtained by looking at the process list when a data upload is being performed. This license can be used to upload data to a central Lynis server. Although no data can be extracted by knowing the license key, it may be possible to upload the data of additional scans.

Action-Not Available
Vendor-cisofyn/aDebian GNU/LinuxFedora Project
Product-lynisdebian_linuxfedoran/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3696
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.37%
||
7 Day CHG~0.00%
Published-13 Jun, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The pulp-qpid-ssl-cfg script in Pulp before 2.8.5 allows local users to obtain the CA key.

Action-Not Available
Vendor-pulpprojectn/aFedora Project
Product-fedorapulpn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-13313
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.84%
||
7 Day CHG~0.00%
Published-05 Jul, 2019 | 13:22
Updated-04 Aug, 2024 | 23:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line.

Action-Not Available
Vendor-libosinfon/aRed Hat, Inc.Fedora Project
Product-libosinfoenterprise_linux_server_ausfedoraenterprise_linuxenterprise_linux_eusenterprise_linux_server_tusn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-1753
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.05% / 15.47%
||
7 Day CHG~0.00%
Published-16 Mar, 2020 | 14:37
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Fedora Project
Product-ansible_engineansible_towerdebian_linuxfedoraAnsible
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CWE ID-CWE-214
Invocation of Process Using Visible Sensitive Information
CVE-2009-2910
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.05% / 15.97%
||
7 Day CHG~0.00%
Published-20 Oct, 2009 | 17:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSELinux Kernel Organization, IncSUSERed Hat, Inc.Fedora Project
Product-ubuntu_linuxlinux_enterprise_desktopenterprise_linux_serverenterprise_linux_workstationenterprise_linux_desktoplinux_enterprise_debuginfolinux_enterprise_serverfedoraenterprise_linux_eusvirtualizationlinux_kernellinux_enterprise_software_development_kitopensusen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-10224
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.15% / 34.88%
||
7 Day CHG~0.00%
Published-25 Nov, 2019 | 00:00
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.

Action-Not Available
Vendor-Red Hat, Inc.Fedora Project
Product-389_directory_server389-ds-base
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2009-3612
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.07% / 22.14%
||
7 Day CHG~0.00%
Published-19 Oct, 2009 | 19:27
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors. NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSELinux Kernel Organization, IncSUSEFedora Project
Product-ubuntu_linuxlinux_enterprise_desktoplinux_enterprise_serverfedoralinux_kernellinux_enterprise_software_development_kitopensusen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-2045
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.08% / 22.55%
||
7 Day CHG~0.00%
Published-12 Mar, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.

Action-Not Available
Vendor-n/aXen ProjectFedora ProjectDebian GNU/Linux
Product-debian_linuxfedoraxenn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-2157
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.13% / 31.28%
||
7 Day CHG~0.00%
Published-27 Mar, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Action-Not Available
Vendor-simon_tathamputtyn/aFedora ProjectDebian GNU/LinuxopenSUSE
Product-debian_linuxfedoraopensuseputtyn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3095
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.61%
||
7 Day CHG~0.00%
Published-08 Jun, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

server/bin/pulp-gen-ca-certificate in Pulp before 2.8.2 allows local users to read the generated private key.

Action-Not Available
Vendor-pulpprojectn/aFedora Project
Product-fedorapulpn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-36241
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.18% / 38.52%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 07:11
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.

Action-Not Available
Vendor-n/aThe GNOME ProjectFedora Project
Product-gnome-autoarfedoran/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-29900
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.5||MEDIUM
EPSS-1.41% / 80.62%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 15:50
Updated-20 Nov, 2024 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

Action-Not Available
Vendor-Debian GNU/LinuxFedora ProjectAdvanced Micro Devices, Inc.Xen Project
Product-epyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareathlon_silver_3050u_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7402epyc_7f32epyc_7551_firmwareepyc_7272_firmwareryzen_3_3100_firmwareryzen_threadripper_2950x_firmwareathlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500ua9-9410_firmwareathlon_x4_940_firmwareepyc_7702ryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareathlon_x4_830_firmwareryzen_3_2300uryzen_5_3600x_firmwareepyc_7542ryzen_7_3750h_firmwareryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7h12_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7f52ryzen_threadripper_pro_5945wxryzen_5_2500u_firmwareepyc_7001ryzen_3_4300g_firmwareryzen_3_3100epyc_7f32_firmwaredebian_linuxepyc_7502ryzen_7_3750hepyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwarea12-9730pryzen_3_2200u_firmwareathlon_x4_840_firmwareepyc_7281ryzen_3_2200uepyc_7551epyc_7551pepyc_7002_firmwareryzen_threadripper_2920xathlon_x4_970a10-9630pepyc_7551p_firmwareathlon_x4_950_firmwareryzen_7_3800xt_firmwareepyc_7601_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xepyc_7352ryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401epyc_7742ryzen_7_2700uepyc_7272ryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geryzen_7_2800hryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_3_4300uryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_5_2600x_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_7_2700_firmwareathlon_x4_835_firmwareryzen_5_3400g_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_4700uryzen_7_3800xa6-9220c_firmwareepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7501athlon_x4_970_firmwareepyc_7301_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_4600hryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_3_3200u_firmwareathlon_x4_750_firmwareathlon_x4_940ryzen_3_3300x_firmwareepyc_7402pepyc_7252_firmwarea4-9120_firmwareryzen_3_3300uepyc_7542_firmwarea6-9210ryzen_threadripper_pro_5945wx_firmwareryzen_3_3300g_firmwareryzen_5_3600xtryzen_5_3450gryzen_5_3550h_firmwareryzen_7_4800hepyc_7252epyc_7502pryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pryzen_9_4900ha12-9700p_firmwareepyc_7351p_firmwarea9-9420fedoraepyc_7302p_firmwareathlon_x4_840ryzen_threadripper_2970wxepyc_7642_firmwareepyc_7452epyc_7h12ryzen_7_3700u_firmwarea6-9220_firmwareathlon_x4_860k_firmwareryzen_5_2600xryzen_7_2700u_firmwareryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gryzen_5_2700epyc_7601epyc_7302ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_7_4700g_firmwareepyc_7552_firmwareryzen_5_3600xepyc_7371epyc_7f72epyc_7662a10-9630p_firmwareryzen_7_3800xtryzen_threadripper_pro_5975wx_firmwareryzen_threadripper_2970wx_firmwareepyc_7642epyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7301ryzen_7_2700xepyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_threadripper_pro_3955wxryzen_3_3200uryzen_7_4700u_firmwareryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830a6-9220cepyc_7302pepyc_7552athlon_silver_3050uathlon_x4_950ryzen_5_4600gepyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwarea6-9210_firmwareathlon_x4_835athlon_x4_845_firmwarea9-9410epyc_7402_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareepyc_7262athlon_x4_845ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxxenryzen_3_3250uepyc_7251_firmwareepyc_7401_firmwareathlon_gold_3150u_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xepyc_7452_firmwareepyc_7351ryzen_3_3300gryzen_threadripper_pro_3945wxathlon_x4_880kryzen_threadripper_3970x_firmwareryzen_3_3250u_firmwareryzen_5_3500u_firmwareryzen_5_3600ryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_7_4800uepyc_7352_firmwareepyc_7702_firmwareepyc_7532AMD Processors
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2020-29480
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.3||LOW
EPSS-0.06% / 18.88%
||
7 Day CHG~0.00%
Published-15 Dec, 2020 | 17:08
Updated-04 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests' devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectXen Project
Product-xendebian_linuxfedoran/a
CWE ID-CWE-862
Missing Authorization
CVE-2020-29660
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 21.02%
||
7 Day CHG~0.00%
Published-09 Dec, 2020 | 16:57
Updated-04 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, IncBroadcom Inc.NetApp, Inc.Debian GNU/Linux
Product-a700s_firmwarea400_firmwareactive_iq_unified_managerh410c_firmware8300_firmwaresolidfire_baseboard_management_controller8300debian_linuxlinux_kernel8700a400fedoraa700sh410cfabric_operating_systemsolidfire_baseboard_management_controller_firmware8700_firmwaren/a
CWE ID-CWE-416
Use After Free
CWE ID-CWE-667
Improper Locking
CVE-2020-1736
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.2||LOW
EPSS-0.06% / 18.14%
||
7 Day CHG~0.00%
Published-16 Mar, 2020 | 15:03
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

Action-Not Available
Vendor-Red Hat, Inc.Fedora Project
Product-cloudforms_management_enginefedoraopenstackansibleansible_toweransible
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2022-23825
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 33.18%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 19:27
Updated-16 Sep, 2024 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.VMware (Broadcom Inc.)Fedora ProjectDebian GNU/Linux
Product-epyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareathlon_silver_3050u_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7402epyc_7f32epyc_7551_firmwareepyc_7272_firmwareryzen_3_3100_firmwareryzen_threadripper_2950x_firmwareathlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500ua9-9410_firmwareathlon_x4_940_firmwareepyc_7702ryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareathlon_x4_830_firmwareryzen_3_2300uryzen_5_3600x_firmwareepyc_7542ryzen_7_3750h_firmwareryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7h12_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7f52ryzen_threadripper_pro_5945wxryzen_5_2500u_firmwareepyc_7001ryzen_3_4300g_firmwareryzen_3_3100epyc_7f32_firmwaredebian_linuxepyc_7502ryzen_7_3750hepyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwarea12-9730pryzen_3_2200u_firmwareathlon_x4_840_firmwareepyc_7281ryzen_3_2200uepyc_7551epyc_7551pepyc_7002_firmwareryzen_threadripper_2920xathlon_x4_970a10-9630pepyc_7551p_firmwareathlon_x4_950_firmwareryzen_7_3800xt_firmwareepyc_7601_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xepyc_7352ryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401epyc_7742ryzen_7_2700uepyc_7272ryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geryzen_7_2800hryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_3_4300uryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_5_2600x_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_7_2700_firmwareathlon_x4_835_firmwareryzen_5_3400g_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_4700uryzen_7_3800xa6-9220c_firmwareepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7501athlon_x4_970_firmwareepyc_7301_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_4600hryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_3_3200u_firmwareathlon_x4_750_firmwareathlon_x4_940ryzen_3_3300x_firmwareepyc_7402pepyc_7252_firmwarea4-9120_firmwareryzen_3_3300uepyc_7542_firmwarea6-9210ryzen_threadripper_pro_5945wx_firmwareryzen_3_3300g_firmwareryzen_5_3600xtryzen_5_3450gryzen_5_3550h_firmwareryzen_7_4800hepyc_7252epyc_7502pryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pryzen_9_4900ha12-9700p_firmwareepyc_7351p_firmwarea9-9420fedoraepyc_7302p_firmwareathlon_x4_840ryzen_threadripper_2970wxepyc_7642_firmwareepyc_7452epyc_7h12ryzen_7_3700u_firmwarea6-9220_firmwareathlon_x4_860k_firmwareryzen_5_2600xryzen_7_2700u_firmwareryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gryzen_5_2700epyc_7601epyc_7302ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_7_4700g_firmwareepyc_7552_firmwareryzen_5_3600xepyc_7371epyc_7f72epyc_7662a10-9630p_firmwareryzen_7_3800xtryzen_threadripper_pro_5975wx_firmwareryzen_threadripper_2970wx_firmwareepyc_7642epyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7301ryzen_7_2700xepyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_threadripper_pro_3955wxryzen_3_3200uryzen_7_4700u_firmwareryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830a6-9220cepyc_7302pepyc_7552athlon_silver_3050uathlon_x4_950ryzen_5_4600gepyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwarea6-9210_firmwareathlon_x4_835athlon_x4_845_firmwarea9-9410epyc_7402_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareepyc_7262athlon_x4_845ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxryzen_3_3250uepyc_7251_firmwareepyc_7401_firmwareathlon_gold_3150u_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xepyc_7452_firmwareepyc_7351ryzen_3_3300gryzen_threadripper_pro_3945wxathlon_x4_880kryzen_threadripper_3970x_firmwareryzen_3_3250u_firmwareryzen_5_3500u_firmwareryzen_5_3600ryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_7_4800uepyc_7352_firmwareepyc_7702_firmwareepyc_7532esxiAMD Processors
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-21123
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.46% / 64.37%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 19:59
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aXen ProjectVMware (Broadcom Inc.)Debian GNU/LinuxIntel CorporationFedora Project
Product-esxidebian_linuxsgx_dcapsgx_pswsgx_sdkfedoraxenIntel(R) Processors
CWE ID-CWE-459
Incomplete Cleanup
CVE-2022-21125
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.54% / 67.49%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 20:01
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aXen ProjectVMware (Broadcom Inc.)Debian GNU/LinuxIntel CorporationFedora Project
Product-esxidebian_linuxsgx_dcapsgx_pswsgx_sdkfedoraxenIntel(R) Processors
CWE ID-CWE-459
Incomplete Cleanup
CVE-2022-21166
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.18% / 39.79%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 20:03
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aXen ProjectVMware (Broadcom Inc.)Debian GNU/LinuxIntel CorporationFedora Project
Product-esxidebian_linuxsgx_dcapsgx_pswsgx_sdkfedoraxenIntel(R) Processors
CWE ID-CWE-459
Incomplete Cleanup
CVE-2014-0103
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.07% / 22.26%
||
7 Day CHG~0.00%
Published-29 Jul, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

Action-Not Available
Vendor-zarafan/aFedora Project
Product-fedorawebappzarafan/a
CVE-2021-3981
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.3||LOW
EPSS-0.02% / 6.77%
||
7 Day CHG~0.00%
Published-08 Mar, 2022 | 14:02
Updated-13 Feb, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.

Action-Not Available
Vendor-n/aFedora ProjectGNU
Product-fedoragrub2grub2
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2008-1567
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.03%
||
7 Day CHG~0.00%
Published-31 Mar, 2008 | 22:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.

Action-Not Available
Vendor-n/aphpMyAdminopenSUSEDebian GNU/LinuxFedora Project
Product-debian_linuxfedoraphpmyadminopensusen/a
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2021-3592
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.8||LOW
EPSS-0.03% / 7.05%
||
7 Day CHG~0.00%
Published-15 Jun, 2021 | 00:00
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.

Action-Not Available
Vendor-libslirp_projectn/aDebian GNU/LinuxRed Hat, Inc.Fedora Project
Product-libslirpdebian_linuxfedoraenterprise_linuxQEMU
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2021-3595
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.8||LOW
EPSS-0.02% / 6.28%
||
7 Day CHG~0.00%
Published-15 Jun, 2021 | 00:00
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.

Action-Not Available
Vendor-libslirp_projectn/aDebian GNU/LinuxRed Hat, Inc.Fedora Project
Product-libslirpdebian_linuxfedoraenterprise_linuxQEMU
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2021-3593
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.8||LOW
EPSS-0.02% / 6.01%
||
7 Day CHG~0.00%
Published-15 Jun, 2021 | 00:00
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.

Action-Not Available
Vendor-libslirp_projectn/aDebian GNU/LinuxRed Hat, Inc.Fedora Project
Product-libslirpdebian_linuxfedoraenterprise_linuxQEMU
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2021-3594
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.8||LOW
EPSS-0.03% / 7.88%
||
7 Day CHG~0.00%
Published-15 Jun, 2021 | 00:00
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.

Action-Not Available
Vendor-libslirp_projectn/aDebian GNU/LinuxRed Hat, Inc.Fedora Project
Product-libslirpdebian_linuxfedoraenterprise_linuxQEMU
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2021-35477
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 5.02%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 03:57
Updated-04 Aug, 2024 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2013-0348
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.04% / 10.95%
||
7 Day CHG~0.00%
Published-13 Dec, 2013 | 18:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

thttpd.c in sthttpd before 2.26.4-r2 and thttpd 2.25b use world-readable permissions for /var/log/thttpd.log, which allows local users to obtain sensitive information by reading the file.

Action-Not Available
Vendor-acmeopen_source_development_teamn/aGentoo Foundation, Inc.openSUSEFedora Project
Product-thttpdsthttpdlinuxfedoraopensusen/a
CVE-2021-34556
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.31%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 04:02
Updated-04 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-3505
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 31.39%
||
7 Day CHG~0.00%
Published-19 Apr, 2021 | 20:22
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerability is to data confidentiality.

Action-Not Available
Vendor-libtpms_projectn/aRed Hat, Inc.Fedora Project
Product-enterprise_linuxfedoralibtpmslibtpms
CWE ID-CWE-331
Insufficient Entropy
CVE-2021-3447
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.58%
||
7 Day CHG~0.00%
Published-01 Apr, 2021 | 00:00
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora Project
Product-ansiblefedoraansible_toweransible
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2021-31829
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.57%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 15:43
Updated-03 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-25678
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 5.17%
||
7 Day CHG~0.00%
Published-08 Jan, 2021 | 17:59
Updated-13 Feb, 2025 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in ceph in versions prior to 16.y.z where ceph stores mgr module passwords in clear text. This can be found by searching the mgr logs for grafana and dashboard, with passwords visible.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora Project
Product-ceph_storagecephfedoraceph
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2012-4453
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.04% / 11.36%
||
7 Day CHG~0.00%
Published-09 Oct, 2012 | 23:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information.

Action-Not Available
Vendor-dracut_projectn/aFedora ProjectRed Hat, Inc.
Product-enterprise_linux_serverenterprise_linux_workstationenterprise_linux_desktopfedoradracutn/a
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2017-9271
Matching Score-8
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-8
Assigner-OpenText (formerly Micro Focus)
CVSS Score-4||MEDIUM
EPSS-0.11% / 28.53%
||
7 Day CHG~0.00%
Published-01 Mar, 2018 | 19:00
Updated-16 Sep, 2024 | 23:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
proxy credentials written to log files by zypper

The commandline package update tool zypper writes HTTP proxy credentials into its logfile, allowing local attackers to gain access to proxies used.

Action-Not Available
Vendor-Fedora ProjectopenSUSESUSE
Product-fedorazypperzypper
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2021-29647
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 25.97%
||
7 Day CHG~0.00%
Published-30 Mar, 2021 | 20:36
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2021-29155
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.21% / 43.46%
||
7 Day CHG~0.00%
Published-20 Apr, 2021 | 00:00
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-28650
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.18% / 38.45%
||
7 Day CHG~0.00%
Published-17 Mar, 2021 | 05:51
Updated-03 Aug, 2024 | 21:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

autoar-extractor.c in GNOME gnome-autoar before 0.3.1, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-36241.

Action-Not Available
Vendor-n/aThe GNOME ProjectFedora Project
Product-gnome-autoarfedoran/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2021-29157
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.76% / 73.44%
||
7 Day CHG~0.00%
Published-28 Jun, 2021 | 11:58
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.

Action-Not Available
Vendor-n/aFedora ProjectDovecot
Product-fedoradovecotn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-13867
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 20.95%
||
7 Day CHG~0.00%
Published-05 Jun, 2020 | 17:30
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open-iSCSI targetcli-fb through 2.1.52 has weak permissions for /etc/target (and for the backup directory and backup files).

Action-Not Available
Vendor-targetcli-fb_projectn/aFedora Project
Product-targetcli-fbfedoran/a
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-20269
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 6.86%
||
7 Day CHG~0.00%
Published-09 Mar, 2022 | 16:29
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.

Action-Not Available
Vendor-kexec-tools_projectn/aRed Hat, Inc.Fedora Project
Product-fedorakexec-toolsenterprise_linuxkexec-tools
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-26933
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.44%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 01:05
Updated-03 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Xen 4.9 through 4.14.x. On Arm, a guest is allowed to control whether memory accesses are bypassing the cache. This means that Xen needs to ensure that all writes (such as the ones during scrubbing) have reached the memory before handing over the page to a guest. Unfortunately, the operation to clean the cache is happening before checking if the page was scrubbed. Therefore there is no guarantee when all the writes will reach the memory.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectXen Project
Product-xendebian_linuxfedoran/a
CVE-2012-2314
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.08% / 23.46%
||
7 Day CHG~0.00%
Published-03 Jul, 2012 | 00:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The bootloader configuration module (pyanaconda/bootloader.py) in Anaconda uses 755 permissions for /etc/grub.d, which allows local users to obtain password hashes and conduct brute force password guessing attacks.

Action-Not Available
Vendor-n/aFedora Project
Product-anacondan/a
CVE-2021-26314
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 25.78%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:23
Updated-17 Sep, 2024 | 02:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Speculative execution with Floating-Point Value Injection

Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result in data leakage.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Intel CorporationFedora ProjectBroadcom Inc.Arm Limited
Product-core_i7-7700kryzen_5_5600xxeon_silver_4214fedoracore_i7-10700kryzen_threadripper_2990wxcortex-a72xenryzen_7_2700xcore_i9-9900kbcm2711All supported processors
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-20239
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.3||LOW
EPSS-0.09% / 24.71%
||
7 Day CHG~0.00%
Published-28 May, 2021 | 10:42
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, IncRed Hat, Inc.
Product-enterprise_linuxlinux_kernelfedorakernel
CWE ID-CWE-822
Untrusted Pointer Dereference
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 22
  • 23
  • Next
Details not found