CWE-710 – Improper Adherence to Coding Standards
Description The software does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities....
CWE-72 – Improper Handling of Apple HFS+ Alternate Data Stream Path
Description The software does not properly handle special paths that may identify the data or resource fork of a file on the HFS+ file system....
CWE-73 – External Control of File Name or Path
Description The software allows user input to control or influence paths or file names that are used in filesystem operations. Modes of Introduction: - Architecture...
Vulnerability Analysis
A vulnerability is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat...
CVE-2016-1239
duck before 0.10 did not properly handle loading of untrusted code from the current directory. Read More
Wiper malware hit Ukrainian organizations
UPDATE January 19: Updated Coverage section about the third malware that FortiGuard Labs has confirmed as a wiper malware..FortiGuard Labs is aware of a report...
CVE-2016-20013
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of...
CVE-2017-0371
MediaWiki before 1.23.16, 1.24.x through 1.27.x before 1.27.2, and 1.28.x before 1.28.1 allows remote attackers to discover the IP addresses of Wiki visitors via a...
CVE-2016-2124
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the...
CVE-2020-25717
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege...