Show filters
813 Total Results
Displaying 521-530 of 813
Sort by:
Attacker Value
Unknown
CVE-2017-7192
Disclosure Date: April 06, 2017 (last updated November 26, 2024)
WebSocket.swift in Starscream before 2.0.4 allows an SSL Pinning bypass because of incorrect management of the certValidated variable (it can be set to true but cannot be set to false).
0
Attacker Value
Unknown
CVE-2017-5887
Disclosure Date: April 06, 2017 (last updated November 26, 2024)
WebSocket.swift in Starscream before 2.0.4 allows an SSL Pinning bypass because pinning occurs in the stream function (this is too late; pinning should occur in the initStreamsWithData function).
0
Attacker Value
Unknown
CVE-2017-2791
Disclosure Date: February 24, 2017 (last updated November 26, 2024)
JustSystems Ichitaro 2016 Trial contains a vulnerability that exists when trying to open a specially crafted PowerPoint file. Due to the application incorrectly handling the error case for a function's result, the application will use this result in a pointer calculation for reading file data into. Due to this, the application will read data from the file into an invalid address thus corrupting memory. Under the right conditions, this can lead to code execution under the context of the application.
0
Attacker Value
Unknown
CVE-2017-2790
Disclosure Date: February 24, 2017 (last updated November 26, 2024)
When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy. This results in a heap-based buffer overflow and can lead to code execution under the context of the application.
0
Attacker Value
Unknown
CVE-2017-2789
Disclosure Date: February 24, 2017 (last updated November 26, 2024)
When copying filedata into a buffer, JustSystems Ichitaro Office 2016 Trial will calculate two values to determine how much data to copy from the document. If both of these values are larger than the size of the buffer, the application will choose the smaller of the two and trust it to copy data from the file. This value is larger than the buffer size, which leads to a heap-based buffer overflow. This overflow corrupts an offset in the heap used in pointer arithmetic for writing data and can lead to code execution under the context of the application.
0
Attacker Value
Unknown
CVE-2016-10173
Disclosure Date: February 01, 2017 (last updated November 25, 2024)
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
0
Attacker Value
Unknown
CVE-2016-9037
Disclosure Date: December 23, 2016 (last updated November 25, 2024)
An exploitable out-of-bounds array access vulnerability exists in the xrow_header_decode function of Tarantool 1.7.2.0-g8e92715. A specially crafted packet can cause the function to access an element outside the bounds of a global array that is used to determine the type of the specified key's value. This can lead to an out of bounds read within the context of the server. An attacker who exploits this vulnerability can cause a denial of service vulnerability on the server.
0
Attacker Value
Unknown
CVE-2016-6321
Disclosure Date: December 09, 2016 (last updated November 25, 2024)
Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
0
Attacker Value
Unknown
CVE-2016-6340
Disclosure Date: September 22, 2016 (last updated November 25, 2024)
The kickstart file in Red Hat QuickStart Cloud Installer (QCI) forces use of MD5 passwords on deployed systems, which makes it easier for attackers to determine cleartext passwords via a brute-force attack.
0
Attacker Value
Unknown
CVE-2016-6322
Disclosure Date: September 22, 2016 (last updated November 25, 2024)
Red Hat QuickStart Cloud Installer (QCI) uses world-readable permissions for /etc/qci/answers, which allows local users to obtain the root password for the deployed system by reading the file.
0