Show filters
83 Total Results
Displaying 71-80 of 83
Sort by:
Attacker Value
Unknown
CVE-2019-8258
Disclosure Date: March 05, 2019 (last updated November 27, 2024)
UltraVNC revision 1198 has a heap buffer overflow vulnerability in VNC client code which results code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1199.
0
Attacker Value
Unknown
CVE-2018-20026
Disclosure Date: February 19, 2019 (last updated November 27, 2024)
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
0
Attacker Value
Unknown
CVE-2019-6109
Disclosure Date: January 31, 2019 (last updated November 08, 2023)
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
0
Attacker Value
Unknown
CVE-2018-5391
Disclosure Date: September 06, 2018 (last updated November 08, 2023)
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
0
Attacker Value
Unknown
CVE-2018-3639
Disclosure Date: May 22, 2018 (last updated November 26, 2024)
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
0
Attacker Value
Unknown
CVE-2017-1000219
Disclosure Date: November 17, 2017 (last updated November 26, 2024)
npm/KyleRoss windows-cpu all versions vulnerable to command injection resulting in code execution as Node.js user
0
Attacker Value
Unknown
CVE-2011-5202
Disclosure Date: October 01, 2012 (last updated October 05, 2023)
BazisVirtualCDBus.sys in WinCDEmu 3.6 allows local users to cause a denial of service (system crash) via the unmount command to batchmnt.exe.
0
Attacker Value
Unknown
CVE-2011-3389
Disclosure Date: September 06, 2011 (last updated October 04, 2023)
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
0
Attacker Value
Unknown
CVE-2008-4609
Disclosure Date: October 20, 2008 (last updated October 04, 2023)
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
0
Attacker Value
Unknown
CVE-2004-0362
Disclosure Date: April 15, 2004 (last updated February 22, 2025)
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
0