Show filters
1,191 Total Results
Displaying 451-460 of 1,191
Sort by:
Attacker Value
Unknown
CVE-2018-19591
Disclosure Date: December 04, 2018 (last updated November 08, 2023)
In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.
0
Attacker Value
Unknown
CVE-2018-16868
Disclosure Date: December 03, 2018 (last updated November 27, 2024)
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
0
Attacker Value
Unknown
CVE-2018-19492
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
0
Attacker Value
Unknown
CVE-2018-19490
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.
0
Attacker Value
Unknown
CVE-2018-19491
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.
0
Attacker Value
Unknown
CVE-2018-19217
Disclosure Date: November 12, 2018 (last updated November 08, 2023)
In ncurses, possibly a 6.x version, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack. NOTE: the original report stated version 6.1, but the issue did not reproduce for that version according to the maintainer or a reliable third-party
0
Attacker Value
Unknown
CVE-2018-19211
Disclosure Date: November 12, 2018 (last updated November 27, 2024)
In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection.
0
Attacker Value
Unknown
CVE-2018-18701
Disclosure Date: October 29, 2018 (last updated November 27, 2024)
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions next_is_type_qual() and cplus_demangle_type() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.
0
Attacker Value
Unknown
CVE-2018-18751
Disclosure Date: October 29, 2018 (last updated November 27, 2024)
An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.
0
Attacker Value
Unknown
CVE-2018-18700
Disclosure Date: October 29, 2018 (last updated November 27, 2024)
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions d_name(), d_encoding(), and d_local_name() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.
0