Show filters
120 Total Results
Displaying 111-120 of 120
Sort by:
Attacker Value
Unknown

CVE-2012-3406

Disclosure Date: February 10, 2014 (last updated October 05, 2023)
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
0
Attacker Value
Unknown

CVE-2013-4282

Disclosure Date: November 02, 2013 (last updated October 05, 2023)
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
0
Attacker Value
Unknown

CVE-2013-4344

Disclosure Date: October 04, 2013 (last updated October 05, 2023)
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
0
Attacker Value
Unknown

CVE-2012-6075

Disclosure Date: February 13, 2013 (last updated October 05, 2023)
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
0
Attacker Value
Unknown

CVE-2013-1591

Disclosure Date: January 31, 2013 (last updated February 16, 2024)
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Attacker Value
Unknown

CVE-2012-3515

Disclosure Date: November 23, 2012 (last updated October 05, 2023)
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
0
Attacker Value
Unknown

CVE-2011-1576

Disclosure Date: August 31, 2011 (last updated October 04, 2023)
The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux 5 and 2.6.32 on Red Hat Enterprise Linux 6, as used in Red Hat Enterprise Virtualization (RHEV) Hypervisor and other products, allows remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.
0
Attacker Value
Unknown

CVE-2009-3080

Disclosure Date: November 20, 2009 (last updated October 04, 2023)
Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
0
Attacker Value
Unknown

CVE-2009-3939

Disclosure Date: November 16, 2009 (last updated January 26, 2024)
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
Attacker Value
Unknown

CVE-2009-2910

Disclosure Date: October 20, 2009 (last updated October 04, 2023)
arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
0