Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown
CVE-2019-3855
Disclosure Date: March 21, 2019 (last updated November 08, 2023)
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
0
Attacker Value
Unknown
CVE-2016-0746
Disclosure Date: February 15, 2016 (last updated November 25, 2024)
Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
0
Attacker Value
Unknown
CVE-2016-0747
Disclosure Date: February 15, 2016 (last updated November 25, 2024)
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.
0
Attacker Value
Unknown
CVE-2016-0742
Disclosure Date: February 15, 2016 (last updated November 25, 2024)
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
0
Attacker Value
Unknown
CVE-2015-3185
Disclosure Date: July 20, 2015 (last updated October 05, 2023)
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
0
Attacker Value
Unknown
CVE-2015-0251
Disclosure Date: April 08, 2015 (last updated October 05, 2023)
The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
0
Attacker Value
Unknown
CVE-2015-0248
Disclosure Date: April 08, 2015 (last updated October 05, 2023)
The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
0
Attacker Value
Unknown
CVE-2014-3580
Disclosure Date: December 18, 2014 (last updated October 05, 2023)
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
0
Attacker Value
Unknown
CVE-2014-8108
Disclosure Date: December 18, 2014 (last updated October 05, 2023)
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
0
Attacker Value
Unknown
CVE-2014-6394
Disclosure Date: October 08, 2014 (last updated October 05, 2023)
visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.
0