cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-14876,https://securityvulnerability.io/vulnerability/CVE-2019-14876,Null Pointer Dereference Vulnerability in Newlib C Library,"An unhandled null pointer dereference flaw exists in the lshift function of the Newlib libc library, where memory allocation for big integers fails without proper validation. This oversight can lead to unexpected application crashes when an attempt is made to access unallocated memory, resulting in a critical operational failure for affected systems.",Red Hat,Newlib,6.5,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-03-19T15:08:25.000Z,0 CVE-2019-14875,https://securityvulnerability.io/vulnerability/CVE-2019-14875,Null Pointer Dereference in newlib libc Library,"The null pointer dereference vulnerability in the multiply function of the newlib libc library occurs due to inadequate error handling during memory allocation. Specifically, when the Balloc function is invoked to allocate a big integer, there is no verification whether the allocation was successful or not. This oversight can lead to a situation where accessing the first element causes a null pointer dereference, potentially crashing the application or causing unpredictable behavior. This vulnerability affects all versions of newlib prior to version 3.3.0.",Red Hat,Newlib,6.5,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-03-19T15:08:12.000Z,0 CVE-2019-14874,https://securityvulnerability.io/vulnerability/CVE-2019-14874,Null Pointer Dereference Vulnerability in Newlib libc Library,"In the i2b function of the Newlib libc library, all versions before 3.3.0 are affected by a null pointer dereference issue. The Balloc function is utilized for large integer memory allocation without confirming if the allocation was successful. This oversight can lead to a null pointer dereference crash when there is a memory allocation failure, which may compromise application stability and lead to service disruptions. Developers utilizing affected versions should update to prevent potential exploitation.",Red Hat,Newlib,6.5,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-03-19T15:07:52.000Z,0 CVE-2019-14878,https://securityvulnerability.io/vulnerability/CVE-2019-14878,Null Pointer Dereference Vulnerability in Newlib libc Library,"The vulnerability arises in the __d2b function of the Newlib libc library, where the Balloc function allocates a big integer without validating the success of the memory allocation. This oversight can lead to a null pointer dereference when attempting to access an uninitialized pointer, resulting in potential application crashes or unexpected behavior.",Red Hat,Newlib,6.5,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-03-19T15:04:19.000Z,0 CVE-2019-14877,https://securityvulnerability.io/vulnerability/CVE-2019-14877,Null Pointer Dereference in newlib libc Library Affects Multiple Versions,"A vulnerability exists in the __mdiff function of the newlib libc library, where prior versions to 3.3.0 do not properly verify successful memory allocation. This oversight can lead to a null pointer dereference when accessing the _wds and _sign variables after a failed allocation, potentially resulting in application crashes or unpredictable behavior.",Red Hat,Newlib,6.5,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-03-19T15:04:15.000Z,0 CVE-2019-14873,https://securityvulnerability.io/vulnerability/CVE-2019-14873,Null Pointer Dereference Vulnerability in Newlib libc Library,"The Newlib libc library, prior to version 3.3.0, contains a vulnerability in the multadd function where the Balloc utility is used to allocate a big integer. A critical flaw arises because there is no verification to ensure that the memory allocation is successful. This oversight can lead to a null pointer dereference if the allocation fails, potentially resulting in application crashes or unexpected behaviors.",Red Hat,Newlib,6.5,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-03-19T15:04:12.000Z,0 CVE-2019-14872,https://securityvulnerability.io/vulnerability/CVE-2019-14872,Memory Allocation Flaws in Newlib Library Impacting Various Vendors,"The _dtoa_r function of the newlib libc library prior to version 3.3.0 has multiple memory allocations that do not appropriately check the return values. This oversight could lead to potential NULL pointer dereferences, resulting in application crashes or unpredictable behavior. It is crucial for developers using affected versions to address these vulnerabilities to ensure their applications can handle memory allocation failures gracefully.",Red Hat,Newlib,6.5,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-03-19T12:35:41.000Z,0 CVE-2019-14871,https://securityvulnerability.io/vulnerability/CVE-2019-14871,Null Pointer Dereference Vulnerability in Newlib for Various Embedded Systems,"In Newlib before version 3.3.0, the REENT_CHECK macro does not adequately handle memory allocation issues when the DEBUG flag is disabled. This oversight can lead to null pointer dereference vulnerabilities in production firmware, potentially causing system instability or crashes. It primarily affects embedded systems relying on this library for memory management, thereby necessitating prompt updates to mitigate associated risks.",Red Hat,Newlib,6.5,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-03-18T15:43:25.000Z,0