Show filters
94 Total Results
Displaying 41-50 of 94
Sort by:
Attacker Value
Unknown
CVE-2014-5077
Disclosure Date: August 01, 2014 (last updated October 05, 2023)
The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
0
Attacker Value
Unknown
CVE-2014-5045
Disclosure Date: August 01, 2014 (last updated October 05, 2023)
The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
0
Attacker Value
Unknown
CVE-2014-3468
Disclosure Date: June 05, 2014 (last updated October 05, 2023)
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
0
Attacker Value
Unknown
CVE-2014-3467
Disclosure Date: June 05, 2014 (last updated October 05, 2023)
Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
0
Attacker Value
Unknown
CVE-2014-3469
Disclosure Date: June 05, 2014 (last updated October 05, 2023)
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
0
Attacker Value
Unknown
CVE-2014-1518
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
0
Attacker Value
Unknown
CVE-2014-1531
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
0
Attacker Value
Unknown
CVE-2014-1523
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
0
Attacker Value
Unknown
CVE-2014-1532
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
0
Attacker Value
Unknown
CVE-2014-1524
Disclosure Date: April 30, 2014 (last updated October 05, 2023)
The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
0