Lucene search

K

IKS, EDS Security Vulnerabilities

openbugbounty
openbugbounty

eds-pizza.de Cross Site Scripting vulnerability OBB-2653693

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

-0.1AI Score

2022-06-16 12:04 PM
9
cve
cve

CVE-2022-29224

Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can “hold” (prevent removal)...

5.9CVSS

5.9AI Score

0.001EPSS

2022-06-09 07:15 PM
73
6
prion
prion

Null pointer dereference

Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can “hold� (prevent removal)...

5.9CVSS

6AI Score

0.001EPSS

2022-06-09 07:15 PM
15
cvelist
cvelist

CVE-2022-29224 Segmentation fault leading to crash in Envoy

Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can “hold” (prevent removal)...

5.9CVSS

7.5AI Score

0.001EPSS

2022-06-09 07:10 PM
nessus
nessus

Rockwellautomation Rslinx Unrestricted Upload of File with Dangerous Type

FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and....

2.8AI Score

0.006EPSS

2021-08-10 12:00 AM
9
rosalinux
rosalinux

Advisory ROSA-SA-2021-1831

Software: evolution-data-server 3.28.5 OS: Cobalt 7.9 CVE-ID: CVE-2020-14928 CVE-Crit: MEDIUM CVE-DESC: From evolution-data-server (eds) to 3.36.3 there is an issue with STARTTLS buffering that affects SMTP and POP3. When the server sends a "start TLS" response, eds reads additional data and...

5.9CVSS

6.8AI Score

0.004EPSS

2021-07-02 04:39 PM
1
nessus
nessus

EulerOS 2.0 SP2 : evolution-data-server (EulerOS-SA-2021-1293)

According to the versions of the evolution-data-server packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends...

5.9CVSS

6.6AI Score

0.004EPSS

2021-02-22 12:00 AM
9
openvas
openvas

Huawei EulerOS: Security Advisory for evolution-data-server (EulerOS-SA-2021-1293)

The remote host is missing an update for the Huawei...

5.9CVSS

6.2AI Score

0.004EPSS

2021-02-22 12:00 AM
5
veracode
veracode

TLS Response Injection

evolution-data-server is vulnerable to TLS response injection. When a server sends a 'begin TLS' response, eds reads additional data and evaluates it in a TLS context, aka "response injection" causing a STARTTLS buffering issue that affects SMTP and...

5.9CVSS

1.9AI Score

0.004EPSS

2020-11-05 03:10 AM
8
nessus
nessus

EulerOS 2.0 SP5 : evolution-data-server (EulerOS-SA-2020-2243)

According to the versions of the evolution-data-server packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends...

5.9CVSS

6AI Score

0.004EPSS

2020-10-30 12:00 AM
14
openbugbounty
openbugbounty

eds-asia.com Cross Site Scripting vulnerability OBB-1383234

Following coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: &nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence; &nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence....

-0.1AI Score

2020-10-05 01:01 PM
7
openbugbounty
openbugbounty

profilacheteur.meuse.fr Cross Site Scripting vulnerability OBB-1332970

Following coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: &nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence; &nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence....

6.3AI Score

2020-09-13 03:38 PM
10
schneier
schneier

Fake Stories in Real News Sites

Fireeye is reporting that a hacking group called Ghostwriter broke into the content management systems of Eastern European news sites to plant fake stories. From a Wired story: The propagandists have created and disseminated disinformation since at least March 2017, with a focus on undermining...

1.2AI Score

2020-07-30 07:56 PM
30
osv
osv

CVE-2020-16117

In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and...

5.9CVSS

6.6AI Score

0.003EPSS

2020-07-29 06:15 PM
4
openbugbounty
openbugbounty

coupleat.com Cross Site Scripting vulnerability OBB-1235459

Following coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: &nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence; &nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence....

-0.1AI Score

2020-07-23 06:34 AM
6
cve
cve

CVE-2020-14928

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response...

5.9CVSS

5.4AI Score

0.004EPSS

2020-07-17 04:15 PM
173
cvelist
cvelist

CVE-2020-14928

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response...

5.5AI Score

0.004EPSS

2020-07-17 03:30 PM
Total number of security vulnerabilities318