Show filters
86 Total Results
Displaying 81-86 of 86
Sort by:
Attacker Value
Unknown
CVE-2007-6746
Disclosure Date: May 21, 2013 (last updated October 05, 2023)
telepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
0
Attacker Value
Unknown
CVE-2013-1675
Disclosure Date: May 16, 2013 (last updated October 22, 2024)
Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
0
Attacker Value
Unknown
CVE-2013-2020
Disclosure Date: May 13, 2013 (last updated October 05, 2023)
Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2013-2021
Disclosure Date: May 13, 2013 (last updated October 05, 2023)
pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.
0
Attacker Value
Unknown
CVE-2013-1861
Disclosure Date: March 28, 2013 (last updated October 05, 2023)
MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
0
Attacker Value
Unknown
CVE-2013-2566
Disclosure Date: March 15, 2013 (last updated October 22, 2024)
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
0