Show filters
174 Total Results
Displaying 71-80 of 174
Sort by:
Attacker Value
Unknown
CVE-2016-2105
Disclosure Date: May 05, 2016 (last updated November 08, 2023)
Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
0
Attacker Value
Unknown
CVE-2016-2107
Disclosure Date: May 05, 2016 (last updated February 17, 2024)
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
0
Attacker Value
Unknown
CVE-2016-3951
Disclosure Date: May 02, 2016 (last updated November 25, 2024)
Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
0
Attacker Value
Unknown
CVE-2016-2187
Disclosure Date: May 02, 2016 (last updated November 25, 2024)
The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
0
Attacker Value
Unknown
CVE-2016-3672
Disclosure Date: April 27, 2016 (last updated November 25, 2024)
The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
0
Attacker Value
Unknown
CVE-2016-3427
Disclosure Date: April 21, 2016 (last updated June 28, 2024)
Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
0
Attacker Value
Unknown
CVE-2016-0668
Disclosure Date: April 21, 2016 (last updated November 25, 2024)
Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.
0
Attacker Value
Unknown
CVE-2016-0642
Disclosure Date: April 21, 2016 (last updated November 25, 2024)
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.
0
Attacker Value
Unknown
CVE-2015-8778
Disclosure Date: April 19, 2016 (last updated November 25, 2024)
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
0
Attacker Value
Unknown
CVE-2015-8776
Disclosure Date: April 19, 2016 (last updated November 25, 2024)
The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
0