Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
starwindsoftware san vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2020-25704
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
Linux Linux Kernel 5.10
Linux Linux Kernel
Debian Debian Linux 9.0
Starwindsoftware Starwind San \\& Nas V8r12
Starwindsoftware Command Center -
Starwindsoftware Starwind Virtual San V8
Starwindsoftware Starwind Hyperconverged Appliance -
1 Github repository
5.5
CVSSv3
CVE-2020-0427
In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAnd...
Google Android -
Debian Debian Linux 9.0
Opensuse Leap 15.1
Opensuse Leap 15.2
Starwindsoftware Starwind Virtual San V8
5.5
CVSSv3
CVE-2020-14314
A memory out-of-bounds read flaw was found in the Linux kernel prior to 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnera...
Linux Linux Kernel 5.9.0
Linux Linux Kernel
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Starwindsoftware Starwind Virtual San V8
5.5
CVSSv3
CVE-2018-3837
An exploitable information disclosure vulnerability exists in the PCX image rendering functionality of Simple DirectMedia Layer SDL2_image-2.0.2. A specially crafted PCX image can cause an out-of-bounds read on the heap, resulting in information disclosure . An attacker can displ...
Libsdl Sdl Image 2.0.2
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Starwindsoftware Starwind Virtual San V8
5.3
CVSSv3
CVE-2019-20807
In Vim prior to 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
Vim Vim
Debian Debian Linux 9.0
Opensuse Leap 15.1
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Apple Mac Os X 10.13.6
Apple Mac Os X 10.14.6
Starwindsoftware Command Center 2
Starwindsoftware San \\& Nas 1.0
1 Article
5.3
CVSSv3
CVE-2018-16737
tinc prior to 1.0.30 has a broken authentication protocol, without even a partial mitigation.
Tinc-vpn Tinc
Starwindsoftware Starwind Virtual San V8
4.3
CVSSv3
CVE-2018-18585
chmd_read_headers in mspack/chmd.c in libmspack prior to 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name).
Kyzer Libmspack 0.7
Kyzer Libmspack 0.6
Kyzer Libmspack 0.5
Kyzer Libmspack 0.4
Kyzer Libmspack 0.3
Debian Debian Linux 8.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 12
Starwindsoftware Starwind Virtual San -
4.1
CVSSv3
CVE-2020-25656
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidential...
Linux Linux Kernel 5.10
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Debian Debian Linux 9.0
Starwindsoftware Starwind Virtual San V8
3.7
CVSSv3
CVE-2018-16738
tinc 1.0.30 up to and including 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
Tinc-vpn Tinc
Debian Debian Linux 9.0
Starwindsoftware Starwind Virtual San V8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3