Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
thrift vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-3558
Python Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue af...
Facebook Thrift
5
CVSSv2
CVE-2019-3564
Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affect...
Facebook Thrift
5
CVSSv2
CVE-2019-3565
Legacy C++ Facebook Thrift servers (using cpp instead of cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to ...
Facebook Thrift
5
CVSSv2
CVE-2019-3552
C++ Facebook Thrift servers (using cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. Thi...
Facebook Thrift
5
CVSSv2
CVE-2019-3559
Java Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affe...
Facebook Thrift
5
CVSSv2
CVE-2018-1320
Apache Thrift Java client library versions 0.5.0 up to and including 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in...
Apache Thrift
Debian Debian Linux 8.0
F5 Traffix Signaling Delivery Controller
Oracle Global Lifecycle Management Opatch
Oracle Nosql Database
5
CVSSv2
CVE-2017-5652
During a routine security analysis, it was found that one of the ports in Apache Impala (incubating) 2.7.0 to 2.8.0 sent data in plaintext even when the cluster was configured to use TLS. The port in question was used by the StatestoreSubscriber class which did not use the approp...
Apache Impala 2.7.0
Apache Impala 2.8.0
4.9
CVSSv2
CVE-2021-35521
A path traversal in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices prior to 2.6.2 allows remote authenticated malicious users to achieve denial of services and information disclosure via TCP/IP packets.
Idemia Morphowave Compact Mdpi Firmware
Idemia Morphowave Compact Mdpi-m Firmware
Idemia Visionpass Mdpi Firmware
Idemia Visionpass Mdpi-m Firmware
Idemia Visionpass Md Firmware -
Idemia Morphowave Compact Md Firmware -
4.6
CVSSv2
CVE-2021-35520
A Buffer Overflow in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices prior to 2.6.2 allows physically proximate authenticated malicious users to achieve code execution, denial of services, and information disclosure via serial ports.
Idemia Morphowave Compact Mdpi Firmware
Idemia Morphowave Compact Mdpi-m Firmware
Idemia Visionpass Mdpi Firmware
Idemia Visionpass Mdpi-m Firmware
4
CVSSv2
CVE-2018-11798
The Apache Thrift Node.js static web server in versions 0.9.2 up to and including 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.
Apache Thrift
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
command injection
CVE-2021-47511
CVE-2024-26238
CVE-2024-4858
CVE-2024-21305
XXE
CVE-2021-47555
CVE-2021-47526
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »