Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digest vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2010-2927
The slapi_printmessage function in IBM Tivoli Directory Server (ITDS) prior to 6.0.0.8-TIV-ITDS-IF0006 allows remote malicious users to cause a denial of service (daemon crash) via multiple incomplete DIGEST-MD5 connection attempts.
Ibm Tivoli Directory Server 6.0.0.7
Ibm Tivoli Directory Server 6.0
Ibm Tivoli Directory Server
4.3
CVSSv2
CVE-2020-25846
The digest generation function of NHIServiSignAdapter has not been verified for source file path, which leads to the SMB request being redirected to a malicious host, resulting in the leakage of user's credential.
Panorama Project Nhiservisignadapter 1.0.20.0218
4.3
CVSSv2
CVE-2019-16370
The PGP signing plugin in Gradle prior to 6.0 relies on the SHA-1 algorithm, which might allow an malicious user to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.
Gradle Gradle
7.5
CVSSv2
CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote malicious users to execute arbitrary code.
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.17
Conectiva Linux 9.0
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.13
Cyrus Sasl 2.1.9
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.11
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.14
Cyrus Sasl 2.1.15
Suse Suse Cvsup 16.1h 36.i586
Conectiva Linux 10.0
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.2.3
7.5
CVSSv2
CVE-2004-2375
Buffer overflow in the POP3 server in 1st Class Mail Server 4.0 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an APOP USER command with a long second parameter (digest).
1st Class Internet Solutions 1st Class Mail Server 4.0
1 EDB exploit
7.5
CVSSv2
CVE-2009-2422
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails prior to 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent malicious...
Rubyonrails Ruby On Rails
Apple Mac Os X 10.5.8
Apple Mac Os X Server 10.5.8
Apple Mac Os X
Apple Mac Os X Server
7.5
CVSSv2
CVE-2021-24020
A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 up to and including 6.4.4, and 6.2.0 up to and including 6.2.7 may allow an unauthenticated malicious user to tamper with signed URLs by appending further data which allows bypass o...
Fortinet Fortimail
10
CVSSv2
CVE-2010-2978
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 does not use an adequate message-digest algorithm for a self-signed certificate, which allows remote malicious users to bypass intended access restrictions via vectors involving collisions, aka Bug ID CSCtd67660.
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
9.3
CVSSv2
CVE-2015-8892
platform/msm_shared/boot_verifier.c in the Qualcomm components in Android prior to 2016-07-05 on Nexus 5X and 6P devices allows malicious users to bypass intended access restrictions via a digest with trailing data, aka Android internal bug 28822807 and Qualcomm internal bug CR90...
Google Android
NA
CVE-2022-23546
In version 2.9.0.beta14 of Discourse, an open-source discussion platform, maliciously embedded urls can leak an admin's digest of recent topics, possibly exposing private information. A patch is available for version 2.9.0.beta15. There are no known workarounds for this issu...
Discourse Discourse 2.9.0
Discourse Discourse
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-34377
CVE-2024-20859
CVE-2023-49606
inject
arbitrary
CVE-2024-33788
CVE-2024-30973
IDOR
CVE-2024-33907
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »