CVE-2014-4168
03.07.2014, 17:55
(1) iodined.c and (2) user.c in iodine before 0.7.0 allows remote attackers to bypass authentication by continuing execution after an error has been triggering.Enginsight
| Vendor | Product | Version |
|---|---|---|
| kryo | iodine | 𝑥 ≤ 0.6.0 |
| kryo | iodine | 0.3.0 |
| kryo | iodine | 0.3.1 |
| kryo | iodine | 0.3.2 |
| kryo | iodine | 0.3.3 |
| kryo | iodine | 0.3.4 |
| kryo | iodine | 0.4.0 |
| kryo | iodine | 0.4.1 |
| kryo | iodine | 0.4.2 |
| kryo | iodine | 0.5.0 |
| kryo | iodine | 0.5.1 |
| kryo | iodine | 0.5.2 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References