Show filters
213 Total Results
Displaying 141-150 of 213
Sort by:
Attacker Value
Unknown

CVE-2019-9021

Disclosure Date: February 22, 2019 (last updated November 27, 2024)
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
0
Attacker Value
Unknown

CVE-2018-20783

Disclosure Date: February 21, 2019 (last updated November 27, 2024)
In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.
0
Attacker Value
Unknown

CVE-2019-3812

Disclosure Date: February 19, 2019 (last updated November 27, 2024)
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
0
Attacker Value
Unknown

CVE-2019-8906

Disclosure Date: February 18, 2019 (last updated November 27, 2024)
do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
Attacker Value
Unknown

CVE-2019-8905

Disclosure Date: February 18, 2019 (last updated November 27, 2024)
do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.
Attacker Value
Unknown

CVE-2019-8341

Disclosure Date: February 15, 2019 (last updated November 08, 2023)
An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing
Attacker Value
Unknown

CVE-2019-5736

Disclosure Date: February 11, 2019 (last updated November 08, 2023)
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Attacker Value
Unknown

CVE-2019-7635

Disclosure Date: February 08, 2019 (last updated November 08, 2023)
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.
Attacker Value
Unknown

CVE-2019-7636

Disclosure Date: February 08, 2019 (last updated November 08, 2023)
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.
Attacker Value
Unknown

CVE-2019-7637

Disclosure Date: February 08, 2019 (last updated November 08, 2023)
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.