Page 8 of 340 results (0.021 seconds)

CVSS: 9.8EPSS: 22%CPEs: 15EXPL: 0

28 Nov 2013 — The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification. La función de análisis en ext/date/lib/parse_iso_intervals.c de PHP hasta la versión 5.5.6 no restringe adecuadamente la creación de objetos DateInterval, lo que podría permitir a atacantes remotos provocar una denegación de servicio (desbord... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=12fe4e90be7bfa2a763197079f68f5568a14e071 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 9.1EPSS: 93%CPEs: 9EXPL: 2

22 Nov 2013 — nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI. nginx 0.8.41 hasta la versión 1.4.3 y 1.5.x anterior a la versión 1.5.7 permite a atacantes remotos evadir restricciones intencionadas a través de un carácter de espacio sin escape en una URI. Ivan Fratric of the Google Security Team discovered a bug in nginx, which might allow an attacker to bypass security restrictions in certain configurations by using a spe... • https://www.exploit-db.com/exploits/38846 • CWE-116: Improper Encoding or Escaping of Output •

CVSS: 7.5EPSS: 7%CPEs: 3EXPL: 3

21 Nov 2013 — The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. SUSE coreutils-i18n.patch para GNU coreutils permite a atacantes dependientes del contexto provocar una denegación de servicio (caída y fallo de segmentación) a través de una cadena larga hacia el comando sort, cuando se ... • https://www.exploit-db.com/exploits/38232 • CWE-20: Improper Input Validation CWE-665: Improper Initialization •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

21 Nov 2013 — The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function. SUSE coreutils-i18n.patch para GNU permite a atacantes dependientes del contexto provocar una denegación de servicio (caída y fallo de segmentación) a través de una cadena larga hacia el comando uniq, lo que desencadena en un desbordamiento de búfer basado en p... • http://rhn.redhat.com/errata/RHSA-2013-1652.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-665: Improper Initialization •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

21 Nov 2013 — The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function. SUSE coreutils-i18n.patch para GNU permite a atacantes dependientes del contexto provocar una denegación de servicio (caída y fallo de segmentación) a través de una cadena larga hacia el comando join, cuando se usa el switch -i, lo que... • http://rhn.redhat.com/errata/RHSA-2013-1652.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-665: Improper Initialization •

CVSS: 7.5EPSS: 5%CPEs: 6EXPL: 0

16 Nov 2013 — The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. La función setup_server_realm en main.c en Key Distribution Center (KDC) de MIT Kerberos 5 (también conocido como krb5) anterior a la versión 1.10.7, cuando se configuran varios campos, permite a atacantes remotos provocar una deneg... • http://advisories.mageia.org/MGASA-2013-0335.html • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 1%CPEs: 49EXPL: 1

13 Nov 2013 — Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element. Vulnerabilidad de uso después de liberación en Google Chrome anterior a la versión 31.0.1650.48 permite a atacantes remotos provocar una denegación de servicio o posiblemente tener otro impacto sin especificar a través de vectores relacionados con el atributo x-webkit-spee... • http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 10%CPEs: 7EXPL: 0

13 Nov 2013 — lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached. lighttpd anterior a la versión 1.4.33 no comprueba el valor de vuelta de (1) setuid, (2) setgid, o (3) setgroups, lo que podría causar que lighttpd se ejecute bajo adm... • http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 13%CPEs: 7EXPL: 0

13 Nov 2013 — Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures. Vulnerabilidad de uso después de liberación en lighttpd anterior a la versión 1.4.33 permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación y caída) a través de vectores que desencadenen fallos FAMMonitorDirectory. lighttpd before 1.4.34, when SNI is enabled, configures wea... • http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 21EXPL: 0

12 Nov 2013 — The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image. La función get_sos de jdmarker.c en libjpeg 6b y libjpeg-turbo hasta la versión 1.3.... • http://advisories.mageia.org/MGASA-2013-0333.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-456: Missing Initialization of a Variable •