CVE-2019-5598
- EPSS 0.35%
- Veröffentlicht 15.05.2019 16:29:01
- Zuletzt bearbeitet 03.04.2025 06:15:40
In FreeBSD 11.3-PRERELEASE before r345378, 12.0-STABLE before r345377, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in pf does not check if the outer ICMP or ICMP6 packet has the same destination IP as the sour...
CVE-2019-5597
- EPSS 2.16%
- Veröffentlicht 15.05.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 04:45:12
In FreeBSD 11.3-PRERELEASE and 12.0-STABLE before r347591, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in the pf IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last r...
CVE-2019-9498
- EPSS 1.21%
- Veröffentlicht 17.04.2019 14:29:04
- Zuletzt bearbeitet 21.11.2024 04:51:44
The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar...
CVE-2019-9499
- EPSS 1.21%
- Veröffentlicht 17.04.2019 14:29:04
- Zuletzt bearbeitet 21.11.2024 04:51:44
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication,...
CVE-2019-9494
- EPSS 1.49%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:43
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that...
CVE-2019-9495
- EPSS 6.2%
- Veröffentlicht 17.04.2019 14:29:03
- Zuletzt bearbeitet 21.11.2024 04:51:43
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execu...
CVE-2019-6111
- EPSS 54.97%
- Veröffentlicht 31.01.2019 18:29:00
- Zuletzt bearbeitet 18.12.2025 15:15:48
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...
CVE-2018-17161
- EPSS 1.96%
- Veröffentlicht 03.01.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:59
In FreeBSD before 11.2-STABLE(r348229), 11.2-RELEASE-p7, 12.0-STABLE(r342228), and 12.0-RELEASE-p1, insufficient validation of network-provided data in bootpd may make it possible for a malicious attacker to craft a bootp packet which could cause a s...
- EPSS 0.86%
- Veröffentlicht 04.12.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:59
In FreeBSD before 11.2-STABLE(r341486) and 11.2-RELEASE-p6, insufficient bounds checking in one of the device models provided by bhyve can permit a guest operating system to overwrite memory in the bhyve host possibly permitting arbitrary code execut...
- EPSS 12.18%
- Veröffentlicht 04.12.2018 15:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:58
In FreeBSD before 11.2-STABLE(r340854) and 11.2-RELEASE-p5, an integer overflow error when handling opcodes can cause memory corruption by sending a specially crafted NFSv4 request. Unprivileged remote users with access to the NFS server may be able ...