Show filters
94 Total Results
Displaying 41-50 of 94
Sort by:
Attacker Value
Unknown

CVE-2014-5077

Disclosure Date: August 01, 2014 (last updated October 05, 2023)
The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
0
Attacker Value
Unknown

CVE-2014-5045

Disclosure Date: August 01, 2014 (last updated October 05, 2023)
The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
0
Attacker Value
Unknown

CVE-2014-3468

Disclosure Date: June 05, 2014 (last updated October 05, 2023)
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
0
Attacker Value
Unknown

CVE-2014-3467

Disclosure Date: June 05, 2014 (last updated October 05, 2023)
Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
0
Attacker Value
Unknown

CVE-2014-3469

Disclosure Date: June 05, 2014 (last updated October 05, 2023)
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
0
Attacker Value
Unknown

CVE-2014-1518

Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Attacker Value
Unknown

CVE-2014-1531

Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
Attacker Value
Unknown

CVE-2014-1523

Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
Attacker Value
Unknown

CVE-2014-1532

Disclosure Date: April 30, 2014 (last updated October 05, 2023)
Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
Attacker Value
Unknown

CVE-2014-1524

Disclosure Date: April 30, 2014 (last updated October 05, 2023)
The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.