CVE-2019-19330
- EPSS 0.91%
- Veröffentlicht 27.11.2019 16:15:11
- Zuletzt bearbeitet 21.11.2024 04:34:35
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
- EPSS 1.78%
- Veröffentlicht 27.11.2019 09:15:11
- Zuletzt bearbeitet 21.11.2024 04:27:38
A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join...
CVE-2011-1934
- EPSS 0.3%
- Veröffentlicht 26.11.2019 22:15:14
- Zuletzt bearbeitet 21.11.2024 01:27:20
lilo-uuid-diskid causes lilo.conf to be world-readable in lilo 23.1.
CVE-2011-1939
- EPSS 8.54%
- Veröffentlicht 26.11.2019 22:15:14
- Zuletzt bearbeitet 21.11.2024 01:27:21
SQL injection vulnerability in Zend Framework 1.10.x before 1.10.9 and 1.11.x before 1.11.6 when using non-ASCII-compatible encodings in conjunction PDO_MySql in PHP before 5.3.6.
CVE-2019-16201
- EPSS 0.61%
- Veröffentlicht 26.11.2019 18:15:15
- Zuletzt bearbeitet 21.11.2024 04:30:15
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or ...
CVE-2019-16254
- EPSS 0.71%
- Veröffentlicht 26.11.2019 18:15:15
- Zuletzt bearbeitet 21.11.2024 04:30:23
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, ...
CVE-2019-16255
- EPSS 1.27%
- Veröffentlicht 26.11.2019 18:15:15
- Zuletzt bearbeitet 21.11.2024 04:30:24
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary R...
CVE-2019-18679
- EPSS 38.43%
- Veröffentlicht 26.11.2019 17:15:13
- Zuletzt bearbeitet 21.11.2024 04:33:31
An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits wi...
CVE-2019-18676
- EPSS 1.37%
- Veröffentlicht 26.11.2019 17:15:12
- Zuletzt bearbeitet 21.11.2024 04:33:30
An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurri...
CVE-2019-18678
- EPSS 9.96%
- Veröffentlicht 26.11.2019 17:15:12
- Zuletzt bearbeitet 21.11.2024 04:33:30
An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (be...