Show filters
148 Total Results
Displaying 51-60 of 148
Sort by:
Attacker Value
Unknown
CVE-2016-2113
Disclosure Date: April 25, 2016 (last updated November 25, 2024)
Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown
CVE-2016-2111
Disclosure Date: April 25, 2016 (last updated November 25, 2024)
The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
0
Attacker Value
Unknown
CVE-2015-8552
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
0
Attacker Value
Unknown
CVE-2016-2774
Disclosure Date: March 09, 2016 (last updated November 25, 2024)
ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
0
Attacker Value
Unknown
CVE-2016-0705
Disclosure Date: March 03, 2016 (last updated November 08, 2023)
Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
0
Attacker Value
Unknown
CVE-2016-0728
Disclosure Date: February 08, 2016 (last updated November 25, 2024)
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
0
Attacker Value
Unknown
CVE-2015-8605
Disclosure Date: January 14, 2016 (last updated November 25, 2024)
ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
0
Attacker Value
Unknown
CVE-2015-3209
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
0
Attacker Value
Unknown
CVE-2015-2150
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
0
Attacker Value
Unknown
CVE-2015-0240
Disclosure Date: February 24, 2015 (last updated October 05, 2023)
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
0