Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digest vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2006-2712
Secure Elements Class 5 AVR (aka C5 EVM) client and server prior to 2.8.1 do not verify the integrity of a message digest, which allows remote malicious users to modify and replay messages.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
668
VMScore
CVE-2021-31917
A flaw was found in Red Hat DataGrid 8.x (8.0.0, 8.0.1, 8.1.0 and 8.1.1) and Infinispan (10.0.0 up to and including 12.0.0). An attacker could bypass authentication on all REST endpoints when DIGEST is used as the authentication method. The highest threat from this vulnerability ...
Infinispan Infinispan-server-rest
Redhat Data Grid 8.0.0
Redhat Data Grid 8.0.1
Redhat Data Grid 8.1.0
Redhat Data Grid 8.1.1
445
VMScore
CVE-2008-7288
IBM Tivoli Directory Server (TDS) 5.2 prior to 5.2.0.5-TIV-ITDS-LA0007 on AIX allows remote malicious users to cause a denial of service (server destabilization) via an anonymous DIGEST-MD5 LDAP Bind operation.
Ibm Tivoli Directory Server 5.2.0
Ibm Tivoli Directory Server 5.2.0.4
445
VMScore
CVE-2010-2927
The slapi_printmessage function in IBM Tivoli Directory Server (ITDS) prior to 6.0.0.8-TIV-ITDS-IF0006 allows remote malicious users to cause a denial of service (daemon crash) via multiple incomplete DIGEST-MD5 connection attempts.
Ibm Tivoli Directory Server 6.0.0.7
Ibm Tivoli Directory Server 6.0
Ibm Tivoli Directory Server
383
VMScore
CVE-2020-25846
The digest generation function of NHIServiSignAdapter has not been verified for source file path, which leads to the SMB request being redirected to a malicious host, resulting in the leakage of user's credential.
Panorama Project Nhiservisignadapter 1.0.20.0218
383
VMScore
CVE-2019-16370
The PGP signing plugin in Gradle prior to 6.0 relies on the SHA-1 algorithm, which might allow an malicious user to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.
Gradle Gradle
668
VMScore
CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote malicious users to execute arbitrary code.
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.17
Conectiva Linux 9.0
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.13
Cyrus Sasl 2.1.9
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.11
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.14
Cyrus Sasl 2.1.15
Suse Suse Cvsup 16.1h 36.i586
Conectiva Linux 10.0
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.2.3
755
VMScore
CVE-2004-2375
Buffer overflow in the POP3 server in 1st Class Mail Server 4.0 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an APOP USER command with a long second parameter (digest).
1st Class Internet Solutions 1st Class Mail Server 4.0
1 EDB exploit
668
VMScore
CVE-2009-2422
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails prior to 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent malicious...
Rubyonrails Ruby On Rails
Apple Mac Os X 10.5.8
Apple Mac Os X Server 10.5.8
Apple Mac Os X
Apple Mac Os X Server
668
VMScore
CVE-2021-24020
A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 up to and including 6.4.4, and 6.2.0 up to and including 6.2.7 may allow an unauthenticated malicious user to tamper with signed URLs by appending further data which allows bypass o...
Fortinet Fortimail
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »