Show filters
564 Total Results
Displaying 381-390 of 564
Sort by:
Attacker Value
Unknown
CVE-2019-5585
Disclosure Date: April 09, 2019 (last updated November 27, 2024)
An improper access control vulnerability in FortiClientMac before 6.0.5 may allow an attacker to affect the application's performance via modifying the contents of a file used by several FortiClientMac processes.
0
Attacker Value
Unknown
CVE-2019-10242
Disclosure Date: April 09, 2019 (last updated November 27, 2024)
In Eclipse Kura versions up to 4.0.0, the SkinServlet did not checked the path passed during servlet call, potentially allowing path traversal in get requests for a limited number of file types.
0
Attacker Value
Unknown
CVE-2019-10243
Disclosure Date: April 09, 2019 (last updated November 27, 2024)
In Eclipse Kura versions up to 4.0.0, Kura exposes the underlying Ui Web server version in its replies. This can be used as a hint by an attacker to specifically craft attacks to the web server run by Kura.
0
Attacker Value
Unknown
CVE-2019-10244
Disclosure Date: April 09, 2019 (last updated November 27, 2024)
In Eclipse Kura versions up to 4.0.0, the Web UI package and component services, the Artemis simple Mqtt component and the emulator position service (not part of the device distribution) could potentially be target of XXE attack due to an improper factory and parser initialisation.
0
Attacker Value
Unknown
CVE-2019-10240
Disclosure Date: April 03, 2019 (last updated November 27, 2024)
Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
0
Attacker Value
Unknown
CVE-2017-7655
Disclosure Date: March 27, 2019 (last updated November 27, 2024)
In Eclipse Mosquitto version from 1.0 to 1.4.15, a Null Dereference vulnerability was found in the Mosquitto library which could lead to crashes for those applications using the library.
0
Attacker Value
Unknown
CVE-2018-12545
Disclosure Date: March 27, 2019 (last updated November 08, 2023)
In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings.
0
Attacker Value
Unknown
CVE-2018-12546
Disclosure Date: March 27, 2019 (last updated November 27, 2024)
In Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) when a client publishes a retained message to a topic, then has its access to that topic revoked, the retained message will still be published to clients that subscribe to that topic in the future. In some applications this may result in clients being able cause effects that would otherwise not be allowed.
0
Attacker Value
Unknown
CVE-2018-12550
Disclosure Date: March 27, 2019 (last updated November 27, 2024)
When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use an ACL file, and that ACL file is empty, or contains only comments or blank lines, then Mosquitto will treat this as though no ACL file has been defined and use a default allow policy. The new behaviour is to have an empty ACL file mean that all access is denied, which is not a useful configuration but is not unexpected.
0
Attacker Value
Unknown
CVE-2018-12551
Disclosure Date: March 27, 2019 (last updated November 27, 2024)
When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use a password file for authentication, any malformed data in the password file will be treated as valid. This typically means that the malformed data becomes a username and no password. If this occurs, clients can circumvent authentication and get access to the broker by using the malformed username. In particular, a blank line will be treated as a valid empty username. Other security measures are unaffected. Users who have only used the mosquitto_passwd utility to create and modify their password files are unaffected by this vulnerability.
0