Show filters
541 Total Results
Displaying 31-40 of 541
Sort by:
Attacker Value
Unknown
CVE-2015-6815
Disclosure Date: January 31, 2020 (last updated February 21, 2025)
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2006-7246
Disclosure Date: January 27, 2020 (last updated February 21, 2025)
NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.
0
Attacker Value
Unknown
CVE-2020-5504
Disclosure Date: January 09, 2020 (last updated February 21, 2025)
In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.
0
Attacker Value
Unknown
CVE-2013-4357
Disclosure Date: December 31, 2019 (last updated November 27, 2024)
The eglibc package before 2.14 incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service.
0
Attacker Value
Unknown
CVE-2019-13730
Disclosure Date: December 10, 2019 (last updated November 08, 2023)
Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
0
Attacker Value
Unknown
CVE-2017-5332
Disclosure Date: November 04, 2019 (last updated November 27, 2024)
The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access unallocated memory, which allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.
0
Attacker Value
Unknown
CVE-2017-5333
Disclosure Date: November 04, 2019 (last updated November 27, 2024)
Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.
0
Attacker Value
Unknown
squid: /usr/sbin/pinger packaged with wrong permission
Disclosure Date: October 07, 2019 (last updated November 27, 2024)
The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary
0
Attacker Value
Unknown
CVE-2018-19655
Disclosure Date: November 29, 2018 (last updated November 08, 2023)
A stack-based buffer overflow in the find_green() function of dcraw through 9.28, as used in ufraw-batch and many other products, may allow a remote attacker to cause a control-flow hijack, denial-of-service, or unspecified other impact via a maliciously crafted raw photo file.
0
Attacker Value
Unknown
CVE-2018-12116
Disclosure Date: November 28, 2018 (last updated November 27, 2024)
Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
0