Fujitsu

M12-2s Firmware

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.57%
  • Published 16.02.2021 17:15:13
  • Last modified 21.11.2024 05:51:55

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value ...

  • EPSS 0.23%
  • Published 27.01.2021 20:15:14
  • Last modified 09.06.2025 16:15:32

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of ser...

Exploit
  • EPSS 0.02%
  • Published 14.12.2020 20:15:13
  • Last modified 21.11.2024 05:38:26

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

  • EPSS 0.1%
  • Published 14.12.2020 20:15:13
  • Last modified 21.11.2024 05:38:39

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed,...

Exploit
  • EPSS 0.59%
  • Published 14.12.2020 20:15:13
  • Last modified 21.11.2024 05:38:39

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

  • EPSS 0.84%
  • Published 09.09.2020 14:15:12
  • Last modified 21.11.2024 05:11:45

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the atta...

  • EPSS 0.38%
  • Published 04.06.2020 13:15:11
  • Last modified 05.05.2025 17:15:59

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated ...

  • EPSS 8.06%
  • Published 31.01.2019 18:29:00
  • Last modified 21.11.2024 04:45:57

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...

Exploit
  • EPSS 57.89%
  • Published 31.01.2019 18:29:00
  • Last modified 21.11.2024 04:45:57

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...

  • EPSS 3.74%
  • Published 10.01.2019 21:29:00
  • Last modified 21.11.2024 04:01:59

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.