Show filters
769 Total Results
Displaying 391-400 of 769
Sort by:
Attacker Value
Unknown
CVE-2014-8136
Disclosure Date: December 19, 2014 (last updated October 05, 2023)
The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-9322
Disclosure Date: December 17, 2014 (last updated October 05, 2023)
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
0
Attacker Value
Unknown
CVE-2014-5353
Disclosure Date: December 16, 2014 (last updated October 05, 2023)
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
0
Attacker Value
Unknown
CVE-2014-8964
Disclosure Date: December 16, 2014 (last updated October 05, 2023)
Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
0
Attacker Value
Unknown
CVE-2014-8134
Disclosure Date: December 12, 2014 (last updated October 05, 2023)
The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
0
Attacker Value
Unknown
CVE-2014-9273
Disclosure Date: December 08, 2014 (last updated October 05, 2023)
lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write.
0
Attacker Value
Unknown
CVE-2014-9116
Disclosure Date: December 02, 2014 (last updated October 05, 2023)
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
0
Attacker Value
Unknown
CVE-2014-8564
Disclosure Date: November 13, 2014 (last updated October 05, 2023)
The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
0
Attacker Value
Unknown
CVE-2014-3646
Disclosure Date: November 10, 2014 (last updated October 05, 2023)
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
0
Attacker Value
Unknown
CVE-2014-3690
Disclosure Date: November 10, 2014 (last updated October 05, 2023)
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
0