Show filters
505 Total Results
Displaying 31-40 of 505
Sort by:
Attacker Value
Unknown

CVE-2016-9843

Disclosure Date: May 23, 2017 (last updated November 08, 2023)
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
Attacker Value
Unknown

CVE-2016-9841

Disclosure Date: May 23, 2017 (last updated November 08, 2023)
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
Attacker Value
Unknown

CVE-2016-2347

Disclosure Date: April 21, 2017 (last updated November 26, 2024)
Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive.
0
Attacker Value
Unknown

CVE-2016-7796

Disclosure Date: October 13, 2016 (last updated November 25, 2024)
The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
0
Attacker Value
Unknown

CVE-2015-8922

Disclosure Date: September 20, 2016 (last updated November 25, 2024)
The read_CodersInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted 7z file, related to the _7z_folder struct.
0
Attacker Value
Unknown

CVE-2016-3992

Disclosure Date: July 26, 2016 (last updated November 25, 2024)
cronic before 3 allows local users to write to arbitrary files via a symlink attack on a (1) cronic.out.$$, (2) cronic.err.$$, or (3) cronic.trace.$$ file in /tmp.
0
Attacker Value
Unknown

CVE-2016-5387

Disclosure Date: July 19, 2016 (last updated November 08, 2023)
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
Attacker Value
Unknown

CVE-2016-4997

Disclosure Date: July 03, 2016 (last updated November 25, 2024)
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
Attacker Value
Unknown

CVE-2016-4470

Disclosure Date: June 27, 2016 (last updated November 25, 2024)
The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
0
Attacker Value
Unknown

CVE-2016-3707

Disclosure Date: June 27, 2016 (last updated November 25, 2024)
The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.
0