Show filters
482 Total Results
Displaying 141-150 of 482
Sort by:
Attacker Value
Unknown
CVE-2018-14633
Disclosure Date: September 25, 2018 (last updated November 27, 2024)
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
0
Attacker Value
Unknown
CVE-2018-17183
Disclosure Date: September 19, 2018 (last updated November 08, 2023)
Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.
0
Attacker Value
Unknown
CVE-2018-14638
Disclosure Date: September 14, 2018 (last updated November 27, 2024)
A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote denial of service.
0
Attacker Value
Unknown
CVE-2016-7035
Disclosure Date: September 10, 2018 (last updated November 08, 2023)
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
0
Attacker Value
Unknown
CVE-2018-16802
Disclosure Date: September 10, 2018 (last updated November 08, 2023)
An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.
0
Attacker Value
Unknown
CVE-2018-14624
Disclosure Date: September 06, 2018 (last updated November 27, 2024)
A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.
0
Attacker Value
Unknown
CVE-2018-16539
Disclosure Date: September 05, 2018 (last updated November 08, 2023)
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.
0
Attacker Value
Unknown
CVE-2018-16540
Disclosure Date: September 05, 2018 (last updated November 08, 2023)
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
0
Attacker Value
Unknown
CVE-2018-16541
Disclosure Date: September 05, 2018 (last updated November 08, 2023)
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
0
Attacker Value
Unknown
CVE-2018-16511
Disclosure Date: September 05, 2018 (last updated November 08, 2023)
An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
0