Show filters
92 Total Results
Displaying 61-70 of 92
Sort by:
Attacker Value
Unknown
CVE-2018-1084
Disclosure Date: April 12, 2018 (last updated November 26, 2024)
corosync before version 2.4.4 is vulnerable to an integer overflow in exec/totemcrypto.c.
0
Attacker Value
Unknown
CVE-2018-7749
Disclosure Date: March 12, 2018 (last updated November 08, 2023)
The SSH server implementation of AsyncSSH before 1.12.1 does not properly check whether authentication is completed before processing other requests. A customized SSH client can simply skip the authentication step.
0
Attacker Value
Unknown
CVE-2017-1000420
Disclosure Date: January 02, 2018 (last updated November 26, 2024)
Syncthing version 0.14.33 and older is vulnerable to symlink traversal resulting in arbitrary file overwrite
0
Attacker Value
Unknown
CVE-2017-14063
Disclosure Date: August 31, 2017 (last updated November 08, 2023)
Async Http Client (aka async-http-client) before 2.0.35 can be tricked into connecting to a host different from the one extracted by java.net.URI if a '?' character occurs in a fragment identifier. Similar bugs were previously identified in cURL (CVE-2016-8624) and Oracle Java 8 java.net.URL.
0
Attacker Value
Unknown
CVE-2014-8242
Disclosure Date: October 26, 2015 (last updated October 05, 2023)
librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
0
Attacker Value
Unknown
CVE-2015-5190
Disclosure Date: September 03, 2015 (last updated October 05, 2023)
The pcsd web UI in PCS 0.9.139 and earlier allows remote authenticated users to execute arbitrary commands via "escape characters" in a URL.
0
Attacker Value
Unknown
CVE-2015-5189
Disclosure Date: September 03, 2015 (last updated October 05, 2023)
Race condition in pcsd in PCS 0.9.139 and earlier uses a global variable to validate usernames, which allows remote authenticated users to gain privileges by sending a command that is checked for security after another user is authenticated.
0
Attacker Value
Unknown
CVE-2013-7398
Disclosure Date: June 24, 2015 (last updated October 05, 2023)
main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.
0
Attacker Value
Unknown
CVE-2013-7397
Disclosure Date: June 24, 2015 (last updated October 05, 2023)
Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.
0
Attacker Value
Unknown
CVE-2014-9682
Disclosure Date: February 28, 2015 (last updated October 05, 2023)
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
0