Show filters
373 Total Results
Displaying 31-40 of 373
Sort by:
Attacker Value
Unknown

CVE-2019-19534

Disclosure Date: December 03, 2019 (last updated November 27, 2024)
In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.
Attacker Value
Unknown

CVE-2019-19526

Disclosure Date: December 03, 2019 (last updated November 27, 2024)
In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.
Attacker Value
Unknown

CVE-2019-14895

Disclosure Date: November 29, 2019 (last updated November 27, 2024)
A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
Attacker Value
Unknown

CVE-2019-18660

Disclosure Date: November 27, 2019 (last updated November 08, 2023)
The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
Attacker Value
Unknown

CVE-2019-19242

Disclosure Date: November 27, 2019 (last updated November 27, 2024)
SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.
Attacker Value
Unknown

CVE-2019-10220

Disclosure Date: November 27, 2019 (last updated November 27, 2024)
Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.
Attacker Value
Unknown

CVE-2019-18678

Disclosure Date: November 26, 2019 (last updated November 08, 2023)
An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.
Attacker Value
Unknown

CVE-2019-18679

Disclosure Date: November 26, 2019 (last updated November 08, 2023)
An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
Attacker Value
Unknown

CVE-2019-15845

Disclosure Date: November 26, 2019 (last updated November 27, 2024)
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
Attacker Value
Unknown

CVE-2019-12523

Disclosure Date: November 26, 2019 (last updated November 08, 2023)
An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.