Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
barrier project barrier vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2021-42076
An issue exists in Barrier prior to 2.3.4. An attacker can cause memory exhaustion in the barriers component (aka the server-side implementation of Barrier) and barrierc by sending long TCP messages.
Barrier Project Barrier
5.8
CVSSv2
CVE-2021-42073
An issue exists in Barrier prior to 2.4.0. An attacker can enter an active session state with the barriers component (aka the server-side implementation of Barrier) simply by supplying a client label that identifies a valid client configuration. This label is "Unnamed" ...
Barrier Project Barrier
5
CVSSv2
CVE-2021-42074
An issue exists in Barrier prior to 2.3.4. An unauthenticated attacker can cause a segmentation fault in the barriers component (aka the server-side implementation of Barrier) by quickly opening and closing TCP connections while sending a Hello message for each TCP session.
Barrier Project Barrier
5
CVSSv2
CVE-2021-42075
An issue exists in Barrier prior to 2.3.4. The barriers component (aka the server-side implementation of Barrier) does not correctly close file descriptors for established TCP connections. An unauthenticated remote attacker can thus cause file descriptor exhaustion in the server ...
Barrier Project Barrier
6.5
CVSSv2
CVE-2021-42072
An issue exists in Barrier prior to 2.4.0. The barriers component (aka the server-side implementation of Barrier) does not sufficiently verify the identify of connecting clients. Clients can thus exploit weaknesses in the provided protocol to cause denial-of-service or stage furt...
Barrier Project Barrier
Fedoraproject Fedora 34
Fedoraproject Fedora 35
5
CVSSv2
CVE-2005-4347
The Linux 2.4 kernel patch in kernel-patch-vserver prior to 1.9.5.5 and 2.x prior to 2.3 for Debian GNU/Linux does not correctly set the "chroot barrier" with util-vserver, which allows malicious users to access files on the host system that are outside of the vserver.
Debian Kernel-patch-vserver
Debian Debian Linux 3.0
Debian Debian Linux 3.1
7.5
CVSSv2
CVE-2005-4418
util-vserver prior to 0.30.208-1 with kernel-patch-vserver prior to 1.9.5.5 and 2.x prior to 2.3 for Debian GNU/Linux sets a default policy that trusts unknown capabilities, which could allow local users to conduct unauthorized activities.
Vserver Util-vserver 0
Vserver Util-vserver 0.30.209
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started