Show filters
311 Total Results
Displaying 121-130 of 311
Sort by:
Attacker Value
Unknown
CVE-2017-1000251
Disclosure Date: September 12, 2017 (last updated November 26, 2024)
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
0
Attacker Value
Unknown
CVE-2017-0902
Disclosure Date: August 31, 2017 (last updated November 26, 2024)
RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
0
Attacker Value
Unknown
CVE-2017-0901
Disclosure Date: August 31, 2017 (last updated November 26, 2024)
RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
0
Attacker Value
Unknown
CVE-2017-0899
Disclosure Date: August 31, 2017 (last updated November 26, 2024)
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
0
Attacker Value
Unknown
CVE-2017-0900
Disclosure Date: August 31, 2017 (last updated November 26, 2024)
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
0
Attacker Value
Unknown
CVE-2017-14064
Disclosure Date: August 31, 2017 (last updated November 26, 2024)
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
0
Attacker Value
Unknown
CVE-2017-5208
Disclosure Date: August 22, 2017 (last updated November 26, 2024)
Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code.
0
Attacker Value
Unknown
CVE-2016-6796
Disclosure Date: August 11, 2017 (last updated December 09, 2023)
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
0
Attacker Value
Unknown
CVE-2016-6797
Disclosure Date: August 10, 2017 (last updated December 09, 2023)
The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.
0
Attacker Value
Unknown
CVE-2016-6794
Disclosure Date: August 10, 2017 (last updated December 09, 2023)
When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
0