CVE-2019-9169
- EPSS 13.96%
- Veröffentlicht 26.02.2019 02:29:00
- Zuletzt bearbeitet 21.11.2024 04:51:07
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
CVE-2019-7317
- EPSS 0.57%
- Veröffentlicht 04.02.2019 08:29:00
- Zuletzt bearbeitet 21.11.2024 04:48:00
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
CVE-2018-5736
- EPSS 43.74%
- Veröffentlicht 16.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:09:16
An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession. This defect could be deliberately exercised by an a...
CVE-2018-5737
- EPSS 1.23%
- Veröffentlicht 16.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:09:17
A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive...
CVE-2018-20685
- EPSS 3.38%
- Veröffentlicht 10.01.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 04:01:59
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-0734
- EPSS 6.05%
- Veröffentlicht 30.10.2018 12:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:50
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1....
CVE-2018-0735
- EPSS 9.26%
- Veröffentlicht 29.10.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:50
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in Ope...
CVE-2018-18065
- EPSS 11.46%
- Veröffentlicht 08.10.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:55:25
_set_key in agent/helpers/table_container.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
CVE-2018-18066
- EPSS 0.59%
- Veröffentlicht 08.10.2018 18:29:00
- Zuletzt bearbeitet 06.05.2025 15:15:54
snmp_oid_compare in snmplib/snmp_api.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an unauthenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
CVE-2018-15919
- EPSS 1.23%
- Veröffentlicht 28.08.2018 08:29:00
- Zuletzt bearbeitet 21.11.2024 03:51:43
Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not w...