CVE-2019-3813
- EPSS 0.26%
- Veröffentlicht 04.02.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:35
Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.
CVE-2019-7310
- EPSS 0.31%
- Veröffentlicht 03.02.2019 03:29:00
- Zuletzt bearbeitet 21.11.2024 04:47:58
In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a c...
CVE-2019-6109
- EPSS 8.06%
- Veröffentlicht 31.01.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:45:57
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...
CVE-2019-6111
- EPSS 57.89%
- Veröffentlicht 31.01.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:45:57
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...
CVE-2019-7150
- EPSS 0.1%
- Veröffentlicht 29.01.2019 00:29:00
- Zuletzt bearbeitet 21.11.2024 04:47:40
An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted inp...
CVE-2017-3135
- EPSS 35.73%
- Veröffentlicht 16.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:24:54
Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3...
CVE-2017-3136
- EPSS 38.17%
- Veröffentlicht 16.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:24:54
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use...
CVE-2017-3137
- EPSS 34.71%
- Veröffentlicht 16.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:24:54
Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which record...
CVE-2017-3142
- EPSS 5.23%
- Veröffentlicht 16.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:24:55
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server tha...
CVE-2017-3143
- EPSS 23.88%
- Veröffentlicht 16.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:24:55
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. A...