Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digest vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-0401
A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initializat...
Openssl Openssl
Stormshield Stormshield Management Center
7.5
CVSSv2
CVE-2022-24754
PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJ...
Teluu Pjsip
Debian Debian Linux 9.0
4
CVSSv2
CVE-2010-0550
admin.htm in Geo++ GNCASTER 1.4.0.7 and previous versions does not properly enforce HTTP Digest Authentication, which allows remote authenticated users to use HTTP Basic Authentication, bypassing intended server policy.
Geopp Geo\\+\\+ Gncaster
Geopp Geo\\+\\+ Gncaster 1.4.0.0
7.5
CVSSv2
CVE-2001-1376
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote malicious users to cause a denial of service and possibly execute arbitrary code via shared secret data.
Gnu Radius 0.95
Icradius Icradius 0.14
Livingston Radius 2.0
Livingston Radius 2.0.1
Livingston Radius 2.1
Miquel Van Smoorenburg Cistron Radius 1.6.4
Miquel Van Smoorenburg Cistron Radius 1.6.5
Radiusclient Radiusclient 0.3.1
Xtradius Xtradius 1.1 Pre1
Ascend Radius 1.16
Freeradius Freeradius 0.2
Icradius Icradius 0.15
Icradius Icradius 0.16
Lucent Radius 2.0
Lucent Radius 2.0.1
Miquel Van Smoorenburg Cistron Radius 1.6 .0
Openradius Openradius 0.8
Yard Radius Project Yard Radius 1.0.16
Yard Radius Yard Radius 1.0.17
Gnu Radius 0.93
Gnu Radius 0.94
Icradius Icradius 0.18
7.5
CVSSv2
CVE-2006-5639
Unspecified vulnerability in the random number generator in OpenWBEM (Web Based Enterprise Management) 3.2.0 allows malicious users to gain privileges via vectors related to "local or HTTP Digest authentication."
Openwbem Openwbem
Openwbem Openwbem 3.2
7.2
CVSSv2
CVE-2021-3345
_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
Gnupg Libgcrypt 1.9.0
Oracle Communications Billing And Revenue Management 12.0.0.3.0
2 Github repositories
NA
CVE-2018-16153
An issue exists in Apereo Opencast 4.x up to and including 10.x prior to 10.6. It sends system digest credentials during authentication attempts to arbitrary external services in some situations.
Apereo Opencast
7.5
CVSSv2
CVE-2007-2291
CRLF injection vulnerability in the Digest Authentication support for Microsoft Internet Explorer 7.0.5730.11 allows remote malicious users to conduct HTTP response splitting attacks via a LF (%0a) in the username attribute.
Microsoft Internet Explorer 7.0.5730.11
7.5
CVSSv2
CVE-2020-25844
The digest generation function of NHIServiSignAdapter has not been verified for parameter’s length, which leads to a stack overflow loophole. Remote attackers can use the leak to execute code without privilege.
Panorama Nhiservisignadapter 1.0.20.0218
5
CVSSv2
CVE-2006-2712
Secure Elements Class 5 AVR (aka C5 EVM) client and server prior to 2.8.1 do not verify the integrity of a message digest, which allows remote malicious users to modify and replay messages.
Secure Elements Class 5 Enterprise Vulnerability Management 2.8.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »