CVE-2017-3139
- EPSS 0.72%
- Veröffentlicht 09.04.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:24:54
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
CVE-2019-3878
- EPSS 3.15%
- Veröffentlicht 26.03.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:46
A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers tha...
CVE-2019-3835
- EPSS 1.67%
- Veröffentlicht 25.03.2019 19:29:01
- Zuletzt bearbeitet 21.11.2024 04:42:39
It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains i...
CVE-2019-3838
- EPSS 1.39%
- Veröffentlicht 25.03.2019 19:29:01
- Zuletzt bearbeitet 21.11.2024 04:42:40
It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the cons...
CVE-2019-3856
- EPSS 4.72%
- Veröffentlicht 25.03.2019 19:29:01
- Zuletzt bearbeitet 21.11.2024 04:42:43
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client syst...
CVE-2019-3857
- EPSS 3.53%
- Veröffentlicht 25.03.2019 19:29:01
- Zuletzt bearbeitet 21.11.2024 04:42:43
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execut...
CVE-2019-3863
- EPSS 8.83%
- Veröffentlicht 25.03.2019 18:29:01
- Zuletzt bearbeitet 19.12.2025 04:15:59
A flaw was found in libssh2 before 1.8.1 creating a vulnerability on the SSH client side. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used by th...
CVE-2019-9948
- EPSS 0.92%
- Veröffentlicht 23.03.2019 18:29:02
- Zuletzt bearbeitet 21.11.2024 04:52:39
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call...
CVE-2019-3855
- EPSS 10.25%
- Veröffentlicht 21.03.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:43
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system wh...
CVE-2019-7221
- EPSS 0.06%
- Veröffentlicht 21.03.2019 16:01:10
- Zuletzt bearbeitet 21.11.2024 04:47:46
The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.