CVE-2013-0163
|
OpenShift haproxy cartridge: predictable /tmp in set-proxy connection hook which could facilitate DoS
Published:
December 05, 2019; 10:15:11 AM -05:00
|
(not available)
|
CVE-2019-19602
|
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.
Published:
December 05, 2019; 09:15:09 AM -05:00
|
(not available)
|
CVE-2019-19317
|
lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.
Published:
December 05, 2019; 09:15:09 AM -05:00
|
V3.1: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2019-19601
|
OpenDetex 2.8.5 has a Buffer Overflow in TexOpen in detex.l because of an incorrect sprintf.
Published:
December 05, 2019; 08:15:11 AM -05:00
|
V3.1: 7.8 HIGH
V2: 6.8 MEDIUM
|
CVE-2019-19598
|
D-Link DAP-1860 devices before v1.04b03 Beta allow access to administrator functions without authentication via the HNAP_AUTH header timestamp value. In HTTP requests, part of the HNAP_AUTH header is the timestamp used to determine the time when the user sent the request. If this value is equal to the value stored in the device's /var/hnap/timestamp file, the request will pass the HNAP_AUTH check function.
Published:
December 04, 2019; 11:15:11 PM -05:00
|
(not available)
|
CVE-2019-19597
|
D-Link DAP-1860 devices before v1.04b03 Beta allow arbitrary remote code execution as root without authentication via shell metacharacters within an HNAP_AUTH HTTP header.
Published:
December 04, 2019; 11:15:11 PM -05:00
|
(not available)
|
CVE-2019-19589
|
The Lever PDF Embedder plugin 4.4 for WordPress does not block the distribution of polyglot PDF documents that are valid JAR archives.
Published:
December 04, 2019; 11:15:11 PM -05:00
|
(not available)
|
CVE-2019-19596
|
GitBook through 2.6.9 allows XSS via a local .md file.
Published:
December 04, 2019; 10:15:11 PM -05:00
|
V3.1: 5.4 MEDIUM
V2: 3.5 LOW
|
CVE-2019-19590
|
In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input.
Published:
December 04, 2019; 09:15:19 PM -05:00
|
(not available)
|
CVE-2019-19588
|
The validators package 0.12.2 through 0.12.5 for Python enters an infinite loop when validators.domain is called with a crafted domain string. This is fixed in 0.12.6.
Published:
December 04, 2019; 08:15:14 PM -05:00
|
V3.1: 7.5 HIGH
V2: 7.8 HIGH
|
CVE-2019-19553
|
In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.
Published:
December 04, 2019; 08:15:14 PM -05:00
|
V3.1: 7.5 HIGH
V2: 5.0 MEDIUM
|
CVE-2019-19587
|
In WSO2 Enterprise Integrator 6.5.0, reflected XSS occurs when updating the message processor configuration from the source view in the Management Console.
Published:
December 04, 2019; 07:15:11 PM -05:00
|
V3.1: 6.1 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-19522
|
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.
Published:
December 04, 2019; 07:15:11 PM -05:00
|
(not available)
|
CVE-2019-19521
|
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).
Published:
December 04, 2019; 07:15:11 PM -05:00
|
(not available)
|
CVE-2019-19520
|
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
Published:
December 04, 2019; 07:15:11 PM -05:00
|
(not available)
|
CVE-2019-19519
|
In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c.
Published:
December 04, 2019; 07:15:11 PM -05:00
|
(not available)
|
CVE-2019-19579
|
An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl's "assignable-add" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these "alternate" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
Published:
December 04, 2019; 05:15:15 PM -05:00
|
(not available)
|
CVE-2013-2745
|
An SQL Injection vulnerability exists in MiniDLNA prior to 1.1.0
Published:
December 04, 2019; 05:15:15 PM -05:00
|
V3.1: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2019-16753
|
An issue was discovered in Decentralized Anonymous Payment System (DAPS) through 2019-08-26. The content to be signed is composed of a representation of strings, rather than being composed of their binary representations. This is a weak signature scheme design that would allow the reuse of signatures in some cases (or even the reuse of signatures, intended for one type of message, for another type). This also affects Private Instant Verified Transactions (PIVX) through 3.4.0.
Published:
December 04, 2019; 03:15:12 PM -05:00
|
(not available)
|
CVE-2019-16752
|
An issue was discovered in Decentralized Anonymous Payment System (DAPS) through 2019-08-26. It is possible to force wallets to send HTTP requests to arbitrary locations, both on the local network and on the internet. This is a serious threat to user privacy, since it can possibly leak their IP address and the fact that they are using the product. This also affects Dash Core through 0.14.0.3 and Private Instant Verified Transactions (PIVX) through 3.4.0.
Published:
December 04, 2019; 03:15:12 PM -05:00
|
(not available)
|