Show filters
86 Total Results
Displaying 1-10 of 86
Sort by:
Attacker Value
Unknown

CVE-2014-0187

Disclosure Date: April 28, 2014 (last updated October 05, 2023)
The openvswitch-agent process in OpenStack Neutron 2013.1 before 2013.2.4 and 2014.1 before 2014.1.1 allows remote authenticated users to bypass security group restrictions via an invalid CIDR in a security group rule, which prevents further rules from being applied.
0
Attacker Value
Unknown

CVE-2013-6891

Disclosure Date: January 26, 2014 (last updated October 05, 2023)
lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
0
Attacker Value
Unknown

CVE-2013-2037

Disclosure Date: January 18, 2014 (last updated October 05, 2023)
httplib2 0.7.2, 0.8, and earlier, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
0
Attacker Value
Unknown

CVE-2013-6425

Disclosure Date: January 18, 2014 (last updated October 05, 2023)
Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
0
Attacker Value
Unknown

CVE-2013-4969

Disclosure Date: January 07, 2014 (last updated October 05, 2023)
Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files.
0
Attacker Value
Unknown

CVE-2013-6422

Disclosure Date: December 23, 2013 (last updated October 05, 2023)
The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
0
Attacker Value
Unknown

CVE-2013-5610

Disclosure Date: December 11, 2013 (last updated October 05, 2023)
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
0
Attacker Value
Unknown

CVE-2013-5619

Disclosure Date: December 11, 2013 (last updated October 05, 2023)
Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
0
Attacker Value
Unknown

CVE-2013-5612

Disclosure Date: December 11, 2013 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
0
Attacker Value
Unknown

CVE-2013-6673

Disclosure Date: December 11, 2013 (last updated October 05, 2023)
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.