Show filters
734 Total Results
Displaying 361-370 of 734
Sort by:
Attacker Value
Unknown
CVE-2014-1532
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
0
Attacker Value
Unknown
CVE-2014-1524
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
0
Attacker Value
Unknown
CVE-2014-1529
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
0
Attacker Value
Unknown
CVE-2014-1530
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
0
Attacker Value
Unknown
CVE-2014-0181
Disclosure Date: April 27, 2014 (last updated October 05, 2023)
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
0
Attacker Value
Unknown
CVE-2014-1647
Disclosure Date: April 23, 2014 (last updated October 05, 2023)
Symantec PGP Desktop 10.0.x through 10.2.x and Encryption Desktop Professional 10.3.x before 10.3.2 MP1 do not properly perform block-data moves, which allows remote attackers to cause a denial of service (read access violation and application crash) via a malformed certificate.
0
Attacker Value
Unknown
CVE-2014-1646
Disclosure Date: April 23, 2014 (last updated October 05, 2023)
Symantec PGP Desktop 10.0.x through 10.2.x and Encryption Desktop Professional 10.3.x before 10.3.2 MP1 do not properly perform memory copies, which allows remote attackers to cause a denial of service (read access violation and application crash) via a malformed certificate.
0
Attacker Value
Unknown
CVE-2013-5704
Disclosure Date: April 15, 2014 (last updated October 05, 2023)
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."
0
Attacker Value
Unknown
CVE-2014-1501
Disclosure Date: March 19, 2014 (last updated October 05, 2023)
Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection.
0
Attacker Value
Unknown
CVE-2014-0098
Disclosure Date: March 18, 2014 (last updated October 05, 2023)
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
0