Show filters
1,191 Total Results
Displaying 341-350 of 1,191
Sort by:
Attacker Value
Unknown

CVE-2015-8313

Disclosure Date: December 20, 2019 (last updated November 27, 2024)
GnuTLS incorrectly validates the first byte of padding in CBC modes
Attacker Value
Unknown

CVE-2014-3591

Disclosure Date: November 29, 2019 (last updated November 27, 2024)
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
Attacker Value
Unknown

CVE-2015-0837

Disclosure Date: November 29, 2019 (last updated November 27, 2024)
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
Attacker Value
Unknown

CVE-2019-14865

Disclosure Date: November 29, 2019 (last updated February 07, 2024)
A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.
Attacker Value
Unknown

CVE-2019-18276

Disclosure Date: November 28, 2019 (last updated November 08, 2023)
An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.
Attacker Value
Unknown

CVE-2011-2207

Disclosure Date: November 27, 2019 (last updated November 27, 2024)
dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to cause a denial of service (DOS) via a specially-crafted certificate.
Attacker Value
Unknown

CVE-2015-1396

Disclosure Date: November 25, 2019 (last updated November 27, 2024)
A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.
Attacker Value
Unknown

CVE-2015-1607

Disclosure Date: November 20, 2019 (last updated November 08, 2023)
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
Attacker Value
Unknown

CVE-2015-1606

Disclosure Date: November 20, 2019 (last updated November 08, 2023)
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
Attacker Value
Unknown

CVE-2019-16200

Disclosure Date: November 20, 2019 (last updated November 27, 2024)
GNU Serveez through 0.2.2 has an Information Leak. An attacker may send an HTTP POST request to the /cgi-bin/reader URI. The attacker must include a Content-length header with a large positive value that, when represented in 32 bit binary, evaluates to a negative number. The problem exists in the http_cgi_write function under http-cgi.c; however, exploitation might show svz_envblock_add in libserveez/passthrough.c as the location of the heap-based buffer over-read.