Show filters
492 Total Results
Displaying 31-40 of 492
Sort by:
Attacker Value
Unknown

CVE-2018-12370

Disclosure Date: October 18, 2018 (last updated November 27, 2024)
In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. This vulnerability affects Firefox < 61.
0
Attacker Value
Unknown

CVE-2018-12372

Disclosure Date: October 18, 2018 (last updated November 27, 2024)
Decrypted S/MIME parts, when included in HTML crafted for an attack, can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird < 52.9.
0
Attacker Value
Unknown

CVE-2017-15422

Disclosure Date: August 28, 2018 (last updated November 08, 2023)
Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
0
Attacker Value
Unknown

AppArmor cupsd Sandbox Bypass Due to Use of Hard Links

Disclosure Date: August 10, 2018 (last updated November 27, 2024)
The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.
0
Attacker Value
Unknown

CVE-2018-7073

Disclosure Date: August 06, 2018 (last updated November 27, 2024)
A local arbitrary file modification vulnerability was identified in HPE Moonshot Provisioning Manager prior to v1.24.
0
Attacker Value
Unknown

CVE-2017-15118

Disclosure Date: July 27, 2018 (last updated November 08, 2023)
A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
0
Attacker Value
Unknown

CVE-2018-1056

Disclosure Date: July 27, 2018 (last updated November 27, 2024)
An out-of-bounds heap buffer read flaw was found in the way advancecomp before 2.1-2018/02 handled processing of ZIP files. An attacker could potentially use this flaw to crash the advzip utility by tricking it into processing crafted ZIP files.
Attacker Value
Unknown

CVE-2017-15119

Disclosure Date: July 27, 2018 (last updated November 08, 2023)
The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.
0
Attacker Value
Unknown

CVE-2018-0500

Disclosure Date: July 11, 2018 (last updated November 27, 2024)
Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value).
0
Attacker Value
Unknown

CVE-2018-13785

Disclosure Date: July 09, 2018 (last updated November 27, 2024)
In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.