NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 31780 | CVE-2014-3615 | The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution. | 2 | 2.1 | Low | 2017-01-19 | 2017-01-02 | View | |
| 40371 | CVE-2013-4851 | The vfs_hang_addrlist function in sys/kern/vfs_export.c in the NFS server implementation in the kernel in FreeBSD 8.3 and 9.x through 9.1-RELEASE-p5 controls authorization for host/subnet export entries on the basis of group information sent by the client, which allows remote attackers to bypass file permissions on NFS filesystems via crafted requests. | 2 | 6.4 | Medium | 2017-01-18 | 2013-08-22 | View | |
| 23696 | CVE-2015-1350 | The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program. | 2 | 2.1 | Low | 2017-02-06 | 2017-02-01 | View | |
| 45002 | CVE-2012-3405 | The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404. | 2 | 5 | Medium | 2017-01-19 | 2014-02-10 | View | |
| 45001 | CVE-2012-3404 | The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers. | 2 | 5 | Medium | 2017-01-19 | 2014-02-10 | View |
Page 2803 of 17672, showing 5 records out of 88360 total, starting on record 14011, ending on 14015