Show filters
183 Total Results
Displaying 111-120 of 183
Sort by:
Attacker Value
Unknown
CVE-2014-9761
Disclosure Date: April 19, 2016 (last updated November 25, 2024)
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
0
Attacker Value
Unknown
CVE-2015-8779
Disclosure Date: April 19, 2016 (last updated November 25, 2024)
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
0
Attacker Value
Unknown
CVE-2015-8777
Disclosure Date: January 20, 2016 (last updated November 25, 2024)
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
0
Attacker Value
Unknown
CVE-2015-5277
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.
0
Attacker Value
Unknown
CVE-2015-1781
Disclosure Date: September 28, 2015 (last updated October 05, 2023)
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
0
Attacker Value
Unknown
CVE-2013-7424
Disclosure Date: August 26, 2015 (last updated October 05, 2023)
The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demonstrated by an internationalized domain name to ping6.
0
Attacker Value
Unknown
CVE-2015-1473
Disclosure Date: April 08, 2015 (last updated October 05, 2023)
The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.
0
Attacker Value
Unknown
CVE-2015-1472
Disclosure Date: April 08, 2015 (last updated October 05, 2023)
The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
0
Attacker Value
Unknown
CVE-2014-8121
Disclosure Date: March 27, 2015 (last updated October 05, 2023)
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
0
Attacker Value
Unknown
CVE-2015-0254
Disclosure Date: March 09, 2015 (last updated October 05, 2023)
Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.
0