Vulnerabilities > CMU
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-07-11 | CVE-2022-31506 | Path Traversal vulnerability in CMU Opendiamond The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | 6.4 |
2014-10-21 | CVE-2014-7723 | Cryptographic Issues vulnerability in CMU Carnegie Mellon Silicon Valley 0.1 The Carnegie Mellon Silicon Valley (aka edu.cmu.sv.mobile) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | 5.4 |
2013-10-27 | CVE-2013-4122 | Numeric Errors vulnerability in CMU Cyrus-Sasl Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference. | 4.3 |
2011-09-14 | CVE-2011-3481 | Unspecified vulnerability in CMU Cyrus Imap Server The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message. network cmu | 4.3 |
2011-09-14 | CVE-2011-3208 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in CMU Cyrus Imap Server Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command. | 7.5 |
2011-05-23 | CVE-2011-1926 | Permissions, Privileges, and Access Controls vulnerability in CMU Cyrus Imap Server The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. | 5.1 |
2009-09-08 | CVE-2009-2632 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in CMU Cyrus Imap Server 2.2.13/2.3.14 Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error. | 4.4 |
2009-04-30 | CVE-2009-0663 | Buffer Errors vulnerability in CMU Dbd::Pg 1.49 Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows. | 7.5 |
1997-06-01 | CVE-1999-0799 | Unspecified vulnerability in CMU Bootpd Buffer overflow in bootpd 2.4.3 and earlier via a long boot file location. | 10.0 |