Latest CVE Feed
-
7.5
HIGHCVE-2010-2450
The keygen.sh script in Shibboleth SP 2.0 (located in /usr/local/etc/shibboleth by default) uses OpenSSL to create a DES private key which is placed in sp-key.pm. It relies on the root umask (default 22) instead of chmoding the resulting file itself, so t... Read more
- EPSS Score: %0.16
- Published: Nov. 07, 2019
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2010-2449
Gource through 0.26 logs to a predictable file name (/tmp/gource-$UID.tmp), enabling attackers to overwrite an arbitrary file via a symlink attack.... Read more
Affected Products : gource- EPSS Score: %0.56
- Published: Nov. 07, 2019
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2010-2447
gitolite before 1.4.1 does not filter src/ or hooks/ from path names.... Read more
Affected Products : gitolite- EPSS Score: %0.51
- Published: Nov. 07, 2019
- Modified: Nov. 21, 2024
-
9.8
CRITICAL- EPSS Score: %0.78
- Published: Nov. 06, 2019
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2010-2250
Drupal 5.x and 6.x before 6.16 uses a user-supplied value in output during site installation which could allow an attacker to craft a URL and perform a cross-site scripting attack.... Read more
Affected Products : drupal- EPSS Score: %0.44
- Published: Nov. 07, 2019
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2010-2247
makepasswd 1.10 default settings generate insecure passwords... Read more
Affected Products : makepasswd- EPSS Score: %0.47
- Published: Nov. 06, 2019
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2010-2243
A vulnerability exists in kernel/time/clocksource.c in the Linux kernel before 2.6.34 where on non-GENERIC_TIME systems (GENERIC_TIME=n), accessing /sys/devices/system/clocksource/clocksource0/current_clocksource results in an OOPS.... Read more
Affected Products : linux_kernel- EPSS Score: %0.79
- Published: Nov. 07, 2019
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2010-2222
The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.... Read more
- EPSS Score: %0.44
- Published: Nov. 05, 2019
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2010-2064
rpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.... Read more
Affected Products : rpcbind- EPSS Score: %0.07
- Published: Oct. 29, 2019
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2010-2061
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.... Read more
Affected Products : rpcbind- EPSS Score: %0.06
- Published: Oct. 29, 2019
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2010-1678
Mapserver 5.2, 5.4 and 5.6 before 5.6.5-2 improperly validates symbol index values during Mapfile parsing.... Read more
Affected Products : mapserver- EPSS Score: %0.68
- Published: Oct. 29, 2019
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2010-1673
A cross-site scripting (XSS) vulnerability in ikiwiki before 3.20101112 allows remote attackers to inject arbitrary web script or HTML via a comment.... Read more
Affected Products : ikiwiki- EPSS Score: %0.33
- Published: Oct. 30, 2019
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2010-1435
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the database through an already existing SQL injection vector.... Read more
Affected Products : joomla\!- EPSS Score: %0.01
- Published: Jun. 21, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2010-1434
Joomla! Core is prone to a session fixation vulnerability. An attacker may leverage this issue to hijack an arbitrary session and gain access to sensitive information, which may help in launching further attacks. Joomla! Core versions 1.5.x ranging from 1... Read more
Affected Products : joomla\!- EPSS Score: %0.01
- Published: Jun. 21, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2010-1433
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the ... Read more
Affected Products : joomla\!- EPSS Score: %0.02
- Published: Jun. 21, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2010-1432
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may help in launching further attacks. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 ar... Read more
Affected Products : joomla\!- EPSS Score: %0.01
- Published: Jun. 21, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2010-10011
A vulnerability, which was classified as problematic, was found in Acritum Femitter Server 1.04. Affected is an unknown function. The manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the... Read more
Affected Products : femitter_server- EPSS Score: %0.24
- Published: Jan. 12, 2024
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2010-10010
A vulnerability classified as problematic has been found in Stars Alliance PsychoStats up to 3.2.2a. This affects an unknown part of the file upload/admin/login.php. The manipulation of the argument ref leads to cross site scripting. It is possible to ini... Read more
Affected Products : psychostats- EPSS Score: %0.07
- Published: Jun. 01, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2010-10009
A vulnerability was found in frioux ptome. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The patch is named 26829bba67858ca0bd4ce49ad50e7ce653914276. It is recommended to apply a patch ... Read more
Affected Products : ptome- EPSS Score: %0.04
- Published: Jan. 18, 2023
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2010-10008
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in simplesamlphp simplesamlphp-module-openidprovider up to 0.8.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file templates/trust.tpl.php... Read more
Affected Products : simplesamlphp-module-openidprovider- EPSS Score: %0.07
- Published: Jan. 17, 2023
- Modified: Nov. 21, 2024