Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-03-20 | CVE-2015-8985 | Data Processing Errors vulnerability in GNU Glibc The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing. | 5.9 |
2017-03-20 | CVE-2015-8984 | Out-of-bounds Read vulnerability in GNU Glibc The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read. | 5.9 |
2017-03-20 | CVE-2015-8983 | Integer Overflow or Wraparound vulnerability in GNU Glibc Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow. | 8.1 |
2017-03-20 | CVE-2015-8954 | Permissions, Privileges, and Access Controls vulnerability in Openinfosecfoundation Suricata The MemcmpLowercase function in Suricata before 2.0.6 improperly excludes the first byte from comparisons, which might allow remote attackers to bypass intrusion-prevention functionality via a crafted HTTP request. | 9.8 |
2017-03-20 | CVE-2015-1610 | Permissions, Privileges, and Access Controls vulnerability in Opendaylight L2Switch hosttracker in OpenDaylight l2switch allows remote attackers to change the host location information by spoofing the MAC address, aka "topology spoofing." | 5.3 |
2017-03-20 | CVE-2014-9851 | Improper Input Validation vulnerability in multiple products ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash). | 7.5 |
2017-03-20 | CVE-2014-9850 | Resource Management Errors vulnerability in multiple products Logic error in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (resource consumption). | 7.5 |
2017-03-20 | CVE-2014-9849 | Resource Exhaustion vulnerability in multiple products The png coder in ImageMagick allows remote attackers to cause a denial of service (crash). | 7.5 |
2017-03-20 | CVE-2014-9848 | Resource Management Errors vulnerability in multiple products Memory leak in ImageMagick allows remote attackers to cause a denial of service (memory consumption). | 7.5 |
2017-03-20 | CVE-2014-9847 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The jng decoder in ImageMagick 6.8.9.9 allows remote attackers to have an unspecified impact. | 9.8 |