Show filters
550 Total Results
Displaying 81-90 of 550
Sort by:
Attacker Value
Unknown

CVE-2018-5391

Disclosure Date: September 06, 2018 (last updated November 08, 2023)
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Attacker Value
Unknown

CVE-2018-14624

Disclosure Date: September 06, 2018 (last updated November 27, 2024)
A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.
0
Attacker Value
Unknown

CVE-2018-16542

Disclosure Date: September 05, 2018 (last updated November 08, 2023)
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.
0
Attacker Value
Unknown

CVE-2018-16540

Disclosure Date: September 05, 2018 (last updated November 08, 2023)
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
0
Attacker Value
Unknown

CVE-2018-16509

Disclosure Date: September 05, 2018 (last updated November 08, 2023)
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
0
Attacker Value
Unknown

CVE-2018-14622

Disclosure Date: August 30, 2018 (last updated November 08, 2023)
A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections.
Attacker Value
Unknown

CVE-2018-15910

Disclosure Date: August 27, 2018 (last updated November 08, 2023)
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
0
Attacker Value
Unknown

CVE-2015-5160

Disclosure Date: August 20, 2018 (last updated November 27, 2024)
libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.
0
Attacker Value
Unknown

CVE-2018-10873

Disclosure Date: August 17, 2018 (last updated November 27, 2024)
A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
0
Attacker Value
Unknown

CVE-2018-10915

Disclosure Date: August 09, 2018 (last updated November 27, 2024)
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
0