| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Improper Protection for Outbound Error Messages and Alert Signals vulnerability in EDM Informatics E-invoice allows Account Footprinting.
This issue affects E-invoice: before 2.1. |
| Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Inohom Home Manager Gateway allows Account Footprinting.
This issue affects Home Manager Gateway: before v.1.27.12. |
| In Netatalk 2.0.0 through 4.4.2, hextoint macro uppercase bug. Fixed in 4.5.0. |
| In Netatalk 3.0.3 through 4.4.2, format string argument mismatch. Fixed in 4.5.0. |
| In Netatalk 3.1.0 through 4.4.2, shell injection via volume path. Fixed in 4.4.3. |
| In Netatalk 1.5.0 through 4.4.2, seteuid failure ignored in auth modules. Fixed in 4.5.0. |
| In Netatalk 2.2.1 through 4.4.2, system() after failed chdir(). Fixed in 4.5.0. |
| In Netatalk 2.0.0 through 4.4.2, unbounded realloc in charset conversion. Fixed in 4.5.0. |
| In Netatalk 3.0.0 through 4.4.2, integer underflow in volxlate. Fixed in 4.5.0. |
| In Netatalk 2.1.0 through 4.4.2, ea path traversal via incomplete sanitization. Fixed in 4.4.3. |
| In Netatalk 2.1.0 through 4.4.2, ea header parsing heap over-read. Fixed in 4.5.0. |
| In Netatalk 3.1.0 through 4.4.2, heap out-of-bounds reads in spotlight rpc unmarshalling. Fixed in 4.4.3. |
| In Netatalk 2.0.0 through 4.4.2, off-by-two in papd lp_write(). Fixed in 4.5.0. |
| In Netatalk 1.3 through 4.4.2, asp session id out-of-bounds access. Fixed in 4.4.3. |
| In Netatalk 2.1.0 through 4.4.2, ldap filter injection. Fixed in 4.5.0. |
| In Netatalk 2.0.4 through 4.4.2, missing o_len bounds check in pull_charset_flags(). Fixed in 4.4.3. |
| In Netatalk 1.5.0 through 4.4.2, des-ecb auth with timing side channel. Fixed in 4.5.0. |
| In Netatalk 1.5.0 through 4.4.2, integer underflow in dsi_writeinit() leads to denial of service. Fixed in 4.4.3. |
| In Netatalk 2.2.5 through 4.4.2, non-reentrant privilege toggle. Fixed in 4.5.0. |
| In Netatalk 2.2.2 through 4.4.2, authentication bypass via admin auth user. Fixed in 4.5.0. |