Show filters
550 Total Results
Displaying 31-40 of 550
Sort by:
Attacker Value
Unknown
CVE-2019-3460
Disclosure Date: April 11, 2019 (last updated November 08, 2023)
A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
0
Attacker Value
Unknown
CVE-2019-0217
Disclosure Date: April 08, 2019 (last updated November 08, 2023)
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
0
Attacker Value
Unknown
CVE-2019-9948
Disclosure Date: March 23, 2019 (last updated November 08, 2023)
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
0
Attacker Value
Unknown
CVE-2019-7221
Disclosure Date: March 21, 2019 (last updated November 08, 2023)
The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
0
Attacker Value
Unknown
CVE-2019-7222
Disclosure Date: March 21, 2019 (last updated November 08, 2023)
The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
0
Attacker Value
Unknown
CVE-2019-6116
Disclosure Date: March 21, 2019 (last updated November 08, 2023)
In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
0
Attacker Value
Unknown
CVE-2019-9636
Disclosure Date: March 08, 2019 (last updated November 08, 2023)
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
0
Attacker Value
Unknown
CVE-2018-12393
Disclosure Date: February 28, 2019 (last updated November 27, 2024)
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
0
Attacker Value
Unknown
CVE-2018-18494
Disclosure Date: February 28, 2019 (last updated November 27, 2024)
A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
0
Attacker Value
Unknown
CVE-2018-12405
Disclosure Date: February 28, 2019 (last updated November 27, 2024)
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
0