Show filters
511 Total Results
Displaying 151-160 of 511
Sort by:
Attacker Value
Unknown

CVE-2014-1874

Disclosure Date: February 28, 2014 (last updated October 05, 2023)
The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.
0
Attacker Value
Unknown

CVE-2014-1943

Disclosure Date: February 18, 2014 (last updated October 05, 2023)
Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
0
Attacker Value
Unknown

CVE-2013-7327

Disclosure Date: February 18, 2014 (last updated October 05, 2023)
The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value, a different vulnerability than CVE-2013-7226.
0
Attacker Value
Unknown

CVE-2012-3405

Disclosure Date: February 10, 2014 (last updated October 05, 2023)
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.
0
Attacker Value
Unknown

CVE-2012-3404

Disclosure Date: February 10, 2014 (last updated October 05, 2023)
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.
0
Attacker Value
Unknown

CVE-2012-3406

Disclosure Date: February 10, 2014 (last updated October 05, 2023)
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
0
Attacker Value
Unknown

CVE-2011-3377

Disclosure Date: February 05, 2014 (last updated October 05, 2023)
The web browser plug-in in IcedTea-Web 1.0.x before 1.0.6 and 1.1.x before 1.1.4 allows remote attackers to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same second-level domain, but a different sub-domain than the targeted domain.
0
Attacker Value
Unknown

CVE-2011-4613

Disclosure Date: February 05, 2014 (last updated October 05, 2023)
The X.Org X wrapper (xserver-wrapper.c) in Debian GNU/Linux and Ubuntu Linux does not properly verify the TTY of a user who is starting X, which allows local users to bypass intended access restrictions by associating stdin with a file that is misinterpreted as the console TTY.
0
Attacker Value
Unknown

CVE-2011-2725

Disclosure Date: February 04, 2014 (last updated October 05, 2023)
Directory traversal vulnerability in Ark 4.7.x and earlier allows remote attackers to delete and force the display of arbitrary files via .. (dot dot) sequences in a zip file.
0
Attacker Value
Unknown

CVE-2013-2037

Disclosure Date: January 18, 2014 (last updated October 05, 2023)
httplib2 0.7.2, 0.8, and earlier, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
0