CVE-2015-1283
- EPSS 0.63%
- Veröffentlicht 23.07.2015 00:59:12
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspec...
CVE-2014-3470
- EPSS 91.4%
- Veröffentlicht 05.06.2014 21:55:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereferen...
CVE-2014-0195
- EPSS 90.91%
- Veröffentlicht 05.06.2014 21:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary c...
CVE-2014-0221
- EPSS 82.1%
- Veröffentlicht 05.06.2014 21:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS...
CVE-2014-2525
- EPSS 63.23%
- Veröffentlicht 28.03.2014 15:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
CVE-2013-6393
- EPSS 8.06%
- Veröffentlicht 06.02.2014 22:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML docum...
- EPSS 1.69%
- Veröffentlicht 31.08.2012 20:55:08
- Zuletzt bearbeitet 11.04.2025 00:51:21
GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.