CVE-2019-3858
- EPSS 1.68%
- Published 21.03.2019 21:29:00
- Last modified 21.11.2024 04:42:43
An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client mem...
CVE-2019-9894
- EPSS 0.94%
- Published 21.03.2019 16:01:17
- Last modified 21.11.2024 04:52:31
A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification.
CVE-2019-9896
- EPSS 2.28%
- Published 21.03.2019 16:01:17
- Last modified 21.11.2024 04:52:31
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
CVE-2019-9897
- EPSS 2.02%
- Published 21.03.2019 16:01:17
- Last modified 21.11.2024 04:52:31
Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71.
CVE-2019-9898
- EPSS 4.44%
- Published 21.03.2019 16:01:17
- Last modified 21.11.2024 04:52:32
Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.
CVE-2019-8934
- EPSS 0.11%
- Published 21.03.2019 16:01:14
- Last modified 21.11.2024 04:50:41
hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
CVE-2019-7222
- EPSS 0.04%
- Published 21.03.2019 16:01:11
- Last modified 21.11.2024 04:47:47
The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
CVE-2019-6778
- EPSS 0.08%
- Published 21.03.2019 16:01:10
- Last modified 21.11.2024 04:47:07
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
CVE-2019-7221
- EPSS 0.06%
- Published 21.03.2019 16:01:10
- Last modified 21.11.2024 04:47:46
The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
CVE-2019-6690
- EPSS 22.01%
- Published 21.03.2019 16:01:09
- Last modified 21.11.2024 04:46:57
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE...