CVE-2019-11184
- EPSS 0.2%
- Veröffentlicht 16.09.2019 16:15:10
- Zuletzt bearbeitet 21.11.2024 04:20:41
A race condition in specific microprocessors using Intel (R) DDIO cache allocation and RDMA may allow an authenticated user to potentially enable partial information disclosure via adjacent access.
CVE-2018-16871
- EPSS 1.53%
- Veröffentlicht 30.07.2019 17:15:12
- Zuletzt bearbeitet 21.11.2024 03:53:29
A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence....
CVE-2019-13115
- EPSS 42.82%
- Veröffentlicht 16.07.2019 18:15:13
- Zuletzt bearbeitet 21.11.2024 04:24:13
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH serve...
CVE-2019-13118
- EPSS 1.21%
- Veröffentlicht 01.07.2019 02:15:09
- Zuletzt bearbeitet 21.11.2024 04:24:13
In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
CVE-2019-10160
- EPSS 2.14%
- Veröffentlicht 07.06.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:18:32
A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by...
CVE-2019-11068
- EPSS 1.01%
- Veröffentlicht 10.04.2019 20:29:01
- Zuletzt bearbeitet 21.11.2024 04:20:28
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is su...
CVE-2019-1559
- EPSS 5.05%
- Veröffentlicht 27.02.2019 23:29:00
- Zuletzt bearbeitet 21.11.2024 04:36:48
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...
CVE-2009-5155
- EPSS 1.37%
- Veröffentlicht 26.02.2019 02:29:00
- Zuletzt bearbeitet 21.11.2024 01:11:17
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting ...
CVE-2018-20796
- EPSS 1.79%
- Veröffentlicht 26.02.2019 02:29:00
- Zuletzt bearbeitet 21.11.2024 04:02:11
In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\\1\\1|t1|\\\2537)+' in grep.
CVE-2019-9169
- EPSS 13.96%
- Veröffentlicht 26.02.2019 02:29:00
- Zuletzt bearbeitet 21.11.2024 04:51:07
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.