Vulnerability & Exploit Database

Displaying entries 1 - 10 of 22 in total

Results for: CVE-2007-1583 Back to search

Red Hat: CVE-2016-1583: Important: kernel security and bug fix update (RHSA-2017:2760) Vulnerability

  • Severity: 7
  • Published: June 27, 2016

The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.

CentOS: (CVE-2016-1583) (Multiple Advisories): kernel Vulnerability

  • Severity: 7
  • Published: June 27, 2016

The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.

SUSE: CVE-2016-1583: SUSE Linux Security Advisory Vulnerability

  • Severity: 7
  • Published: June 16, 2016

The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.

Gentoo Linux: CVE-2007-6454: PeerCast: Buffer overflow Vulnerability

  • Severity: 10
  • Published: December 19, 2007

Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request.

FreeBSD: peercast -- buffer overflow vulnerability (CVE-2007-6454) Vulnerability

  • Severity: 10
  • Published: December 19, 2007

Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request.

SUSE-SA:2007:032: php4,php5 security problems Vulnerability

  • Severity: 10
  • Published: May 23, 2007

Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.

USN-455-1: PHP vulnerabilities Vulnerability

  • Severity: 8
  • Published: March 27, 2007

CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t...

RHSA-2007:0162: php security update Vulnerability

  • Severity: 8
  • Published: March 27, 2007

Updated PHP packages that fix several security issues are now available for Red Hat Application Stack v1.1. This update has been rated as having important security impact by the Red Hat Security Response Team.

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. A denial of service f...