Show filters
260 Total Results
Displaying 121-130 of 260
Sort by:
Attacker Value
Unknown

CVE-2018-7977

Disclosure Date: November 27, 2018 (last updated November 27, 2024)
There is an information leakage vulnerability on several Huawei products. Due to insufficient communication protection for specific services, a remote, unauthorized attacker can exploit this vulnerability to connect to specific services to obtain additional information. Successful exploitation of this vulnerability can lead to information leakage.
0
Attacker Value
Unknown

CVE-2016-2121

Disclosure Date: October 31, 2018 (last updated November 27, 2024)
A permissions flaw was found in redis, which sets weak permissions on certain files and directories that could potentially contain sensitive information. A local, unprivileged user could possibly use this flaw to access unauthorized system information.
0
Attacker Value
Unknown

CVE-2018-18438

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
0
Attacker Value
Unknown

CVE-2018-17963

Disclosure Date: October 09, 2018 (last updated November 27, 2024)
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
Attacker Value
Unknown

CVE-2018-1000807

Disclosure Date: October 08, 2018 (last updated November 18, 2023)
Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.
Attacker Value
Unknown

CVE-2018-1000808

Disclosure Date: October 08, 2018 (last updated November 27, 2024)
Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
0
Attacker Value
Unknown

CVE-2018-17204

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
Attacker Value
Unknown

CVE-2018-17206

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
Attacker Value
Unknown

CVE-2018-17205

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.
0
Attacker Value
Unknown

CVE-2018-14620

Disclosure Date: September 10, 2018 (last updated November 27, 2024)
The OpenStack RabbitMQ container image insecurely retrieves the rabbitmq_clusterer component over HTTP during the build stage. This could potentially allow an attacker to serve malicious code to the image builder and install in the resultant container image. Version of openstack-rabbitmq-container and openstack-containers as shipped with Red Hat Openstack 12, 13, 14 are believed to be vulnerable.
0