2019-11-07
|
CVE-2019-3465
|
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
|
Debian_linux, Simplesamlphp, Xmlseclibs
|
8.8
|
|
|
2019-11-07
|
CVE-2013-1425
|
ldap-git-backup before 1.0.4 exposes password hashes due to incorrect directory permissions.
|
Debian_linux, Ldap_git_backup
|
5.5
|
|
|
2020-02-03
|
CVE-2020-8597
|
eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
|
Ubuntu_linux, Debian_linux, Point\-To\-Point_protocol, Pfc_firmware
|
9.8
|
|
|
2019-11-07
|
CVE-2013-1429
|
Lintian before 2.5.12 allows remote attackers to gather information about the "host" system using crafted symlinks.
|
Ubuntu_linux, Debian_linux, Lintian
|
6.3
|
|
|
2019-11-11
|
CVE-2019-18849
|
In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
|
Ubuntu_linux, Debian_linux, Fedora, Tnef
|
5.5
|
|
|
2019-11-13
|
CVE-2019-18397
|
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text...
|
Debian_linux, Fribidi
|
7.8
|
|
|
2019-11-14
|
CVE-2019-11135
|
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
|
Ubuntu_linux, Debian_linux, Fedora, Apollo_2000_firmware, Apollo_4200_firmware, Proliant_bl460c_firmware, Proliant_dl120_firmware, Proliant_dl160_firmware, Proliant_dl180_firmware, Proliant_dl20_firmware, Proliant_dl360_firmware, Proliant_dl380_firmware, Proliant_dl560_firmware, Proliant_dl580_firmware, Proliant_e910_firmware, Proliant_ml110_firmware, Proliant_ml30_firmware, Proliant_ml350_firmware, Proliant_xl170r_firmware, Proliant_xl190r_firmware, Proliant_xl230k_firmware, Proliant_xl270d_firmware, Proliant_xl450_firmware, Synergy_480_firmware, Synergy_660_firmware, Celeron_5305u_firmware, Core_i5\-10110y_firmware, Core_i5\-10210u_firmware, Core_i5\-10210y_firmware, Core_i5\-10310y_firmware, Core_i5\-8200y_firmware, Core_i5\-8210y_firmware, Core_i5\-8265u_firmware, Core_i5\-8310y_firmware, Core_i5\-8365u_firmware, Core_i5\-9300h_firmware, Core_i5\-9400_firmware, Core_i5\-9400f_firmware, Core_i5\-9400h_firmware, Core_i5\-9600k_firmware, Core_i5\-9600kf_firmware, Core_i7\-10510u_firmware, Core_i7\-10510y_firmware, Core_i7\-8500y_firmware, Core_i7\-8565u_firmware, Core_i7\-8665u_firmware, Core_i7\-9700k_firmware, Core_i7\-9700kf_firmware, Core_i7\-9750hf_firmware, Core_i7\-9850h_firmware, Core_i9\-9880h_firmware, Core_i9\-9900k_firmware, Core_i9\-9900kf_firmware, Core_i9\-9980hk_firmware, Core_m3\-8100y_firmware, Pentium_6405u_firmware, Xeon_3204_firmware, Xeon_3206r_firmware, Xeon_4208_firmware, Xeon_4208r_firmware, Xeon_4209t_firmware, Xeon_4210_firmware, Xeon_4210r_firmware, Xeon_4214_firmware, Xeon_4214c_firmware, Xeon_4214r_firmware, Xeon_4214y_firmware, Xeon_4215_firmware, Xeon_4216_firmware, Xeon_4216r_firmware, Xeon_5215_firmware, Xeon_5215l_firmware, Xeon_5215m_firmware, Xeon_5215r_firmware, Xeon_5217_firmware, Xeon_5218_firmware, Xeon_5218b_firmware, Xeon_5218n_firmware, Xeon_5218t_firmware, Xeon_5220_firmware, Xeon_5220r_firmware, Xeon_5220s_firmware, Xeon_5220t_firmware, Xeon_5222_firmware, Xeon_6222v_firmware, Xeon_6226_firmware, Xeon_6230_firmware, Xeon_6230n_firmware, Xeon_6230t_firmware, Xeon_6234_firmware, Xeon_6238_firmware, Xeon_6238l_firmware, Xeon_6238m_firmware, Xeon_6238t_firmware, Xeon_6240_firmware, Xeon_6240l_firmware, Xeon_6240m_firmware, Xeon_6240y_firmware, Xeon_6242_firmware, Xeon_6244_firmware, Xeon_6246_firmware, Xeon_6248_firmware, Xeon_6252_firmware, Xeon_6252n_firmware, Xeon_6254_firmware, Xeon_6262v_firmware, Xeon_8253_firmware, Xeon_8256_firmware, Xeon_8260_firmware, Xeon_8260l_firmware, Xeon_8260m_firmware, Xeon_8260y_firmware, Xeon_8268_firmware, Xeon_8270_firmware, Xeon_8276_firmware, Xeon_8276l_firmware, Xeon_8276m_firmware, Xeon_8280_firmware, Xeon_8280l_firmware, Xeon_8280m_firmware, Xeon_9220_firmware, Xeon_9221_firmware, Xeon_9222_firmware, Xeon_9242_firmware, Xeon_9282_firmware, Xeon_e\-2278g_firmware, Xeon_e\-2278ge_firmware, Xeon_e\-2278gel_firmware, Xeon_e\-2286m_firmware, Xeon_e\-2288g_firmware, Xeon_w\-2223_firmware, Xeon_w\-2225_firmware, Xeon_w\-2235_firmware, Xeon_w\-2245_firmware, Xeon_w\-2255_firmware, Xeon_w\-2265_firmware, Xeon_w\-2275_firmware, Xeon_w\-2295_firmware, Xeon_w\-3223_firmware, Xeon_w\-3225_firmware, Xeon_w\-3235_firmware, Xeon_w\-3245_firmware, Xeon_w\-3245m_firmware, Xeon_w\-3265_firmware, Xeon_w\-3265m_firmware, Xeon_w\-3275_firmware, Xeon_w\-3275m_firmware, Leap, Zfs_storage_appliance_kit, Codeready_linux_builder, Codeready_linux_builder_eus, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_eus, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Virtualization_manager, Slackware
|
6.5
|
|
|
2019-11-14
|
CVE-2019-11139
|
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
|
Debian_linux, Xeon_3104_firmware, Xeon_3106_firmware, Xeon_4108_firmware, Xeon_4109t_firmware, Xeon_4110_firmware, Xeon_4112_firmware, Xeon_4114_firmware, Xeon_4114t_firmware, Xeon_4116_firmware, Xeon_4116t_firmware, Xeon_5115_firmware, Xeon_5118_firmware, Xeon_5119t_firmware, Xeon_5120_firmware, Xeon_5120t_firmware, Xeon_5122_firmware, Xeon_6126_firmware, Xeon_6126f_firmware, Xeon_6126t_firmware, Xeon_6128_firmware, Xeon_6130_firmware, Xeon_6130f_firmware, Xeon_6130t_firmware, Xeon_6132_firmware, Xeon_6134_firmware, Xeon_6134m_firmware, Xeon_6136_firmware, Xeon_6138_firmware, Xeon_6138f_firmware, Xeon_6138t_firmware, Xeon_6140_firmware, Xeon_6140m_firmware, Xeon_6142_firmware, Xeon_6142f_firmware, Xeon_6144_firmware, Xeon_6146_firmware, Xeon_6148_firmware, Xeon_6148f_firmware, Xeon_6150_firmware, Xeon_6152_firmware, Xeon_6154_firmware, Xeon_8153_firmware, Xeon_8156_firmware, Xeon_8158_firmware, Xeon_8160_firmware, Xeon_8160f_firmware, Xeon_8160m_firmware, Xeon_8160t_firmware, Xeon_8164_firmware, Xeon_8168_firmware, Xeon_8170_firmware, Xeon_8170m_firmware, Xeon_8176_firmware, Xeon_8176f_firmware, Xeon_8176m_firmware, Xeon_8180_firmware, Xeon_8180m_firmware, Leap
|
6.0
|
|
|
2019-11-15
|
CVE-2019-18928
|
Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.
|
Imap, Debian_linux, Fedora
|
9.8
|
|
|
2019-11-17
|
CVE-2019-19012
|
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
|
Debian_linux, Fedora, Oniguruma, Enterprise_linux
|
9.8
|
|
|