CVE-2018-16890
- EPSS 1.42%
- Veröffentlicht 06.02.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:32
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subjec...
CVE-2019-3822
- EPSS 26.44%
- Veröffentlicht 06.02.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:36
libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents...
CVE-2019-3823
- EPSS 2.1%
- Veröffentlicht 06.02.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:37
libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed n...
CVE-2019-3463
- EPSS 13.44%
- Veröffentlicht 06.02.2019 19:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:05
Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
CVE-2019-3464
- EPSS 10.79%
- Veröffentlicht 06.02.2019 19:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:05
Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
CVE-2018-18500
- EPSS 30.24%
- Veröffentlicht 05.02.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:56:03
A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affec...
CVE-2018-18501
- EPSS 4.73%
- Veröffentlicht 05.02.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:56:03
Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to r...
- EPSS 5.06%
- Veröffentlicht 05.02.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:56:04
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created...
CVE-2018-18506
- EPSS 2.44%
- Veröffentlicht 05.02.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:56:04
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This b...
CVE-2018-8791
- EPSS 0.72%
- Veröffentlicht 05.02.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:14:19
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.