NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 10196 | CVE-2011-3581 | Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length. | 2 | 6.8 | Medium | 2017-01-07 | 2016-12-07 | View | |
| 10197 | CVE-2011-3587 | Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules. | 2 | 9.3 | High | 2017-01-07 | 2011-10-20 | View | |
| 10198 | CVE-2011-3588 | The SSH configuration in the Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, disables the StrictHostKeyChecking option, which allows man-in-the-middle attackers to spoof kdump servers, and obtain sensitive core information, by using an arbitrary SSH key. | 2 | 5.7 | Medium | 2017-01-07 | 2014-03-05 | View | |
| 10199 | CVE-2011-3589 | The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, uses world-readable permissions for vmcore files, which allows local users to obtain sensitive information by inspecting the file content, as demonstrated by a search for a root SSH key. | 2 | 5.7 | Medium | 2017-01-07 | 2014-03-05 | View | |
| 10200 | CVE-2011-3590 | The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, includes all of root"s SSH private keys within a vmcore file, which allows context-dependent attackers to obtain sensitive information by inspecting the file content. | 2 | 5.7 | Medium | 2017-01-07 | 2014-03-05 | View |
Page 2040 of 17672, showing 5 records out of 88360 total, starting on record 10196, ending on 10200