Show filters
19 Total Results
Displaying 11-19 of 19
Sort by:
Attacker Value
Unknown
CVE-2018-18313
Disclosure Date: December 07, 2018 (last updated November 08, 2023)
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
0
Attacker Value
Unknown
CVE-2018-18311
Disclosure Date: December 07, 2018 (last updated November 08, 2023)
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
0
Attacker Value
Unknown
CVE-2018-18314
Disclosure Date: December 07, 2018 (last updated November 08, 2023)
Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
0
Attacker Value
Unknown
CVE-2018-18312
Disclosure Date: December 05, 2018 (last updated November 08, 2023)
Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
0
Attacker Value
Unknown
CVE-2018-0735
Disclosure Date: October 29, 2018 (last updated November 08, 2023)
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
0
Attacker Value
Unknown
CVE-2018-12015
Disclosure Date: June 07, 2018 (last updated November 26, 2024)
In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
0
Attacker Value
Unknown
CVE-2016-8610
Disclosure Date: November 13, 2017 (last updated January 27, 2024)
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
0
Attacker Value
Unknown
CVE-2015-8544
Disclosure Date: February 07, 2017 (last updated November 26, 2024)
NetApp SnapDrive for Windows before 7.0.2P4, 7.0.3, and 7.1 before 7.1.3P1 allows remote attackers to obtain sensitive information via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-8960
Disclosure Date: September 21, 2016 (last updated November 25, 2024)
The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
0