Opensuse

Leap

1897 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.32%
  • Veröffentlicht 18.04.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:24

When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.

Exploit
  • EPSS 3.59%
  • Veröffentlicht 18.04.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:24

When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.

  • EPSS 1.06%
  • Veröffentlicht 17.04.2019 14:29:04
  • Zuletzt bearbeitet 21.11.2024 04:51:44

The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar...

  • EPSS 1.06%
  • Veröffentlicht 17.04.2019 14:29:04
  • Zuletzt bearbeitet 21.11.2024 04:51:44

The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication,...

  • EPSS 1.54%
  • Veröffentlicht 17.04.2019 14:29:03
  • Zuletzt bearbeitet 21.11.2024 04:51:43

The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that...

  • EPSS 6.03%
  • Veröffentlicht 17.04.2019 14:29:03
  • Zuletzt bearbeitet 21.11.2024 04:51:43

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execu...

  • EPSS 0.85%
  • Veröffentlicht 11.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:00

The XMLTooling library all versions prior to V3.0.4, provided with the OpenSAML and Shibboleth Service Provider software, contains an XML parsing class. Invalid data in the XML declaration causes an exception of a type that was not handled properly i...

  • EPSS 1.01%
  • Veröffentlicht 10.04.2019 20:29:01
  • Zuletzt bearbeitet 21.11.2024 04:20:28

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is su...

  • EPSS 2.86%
  • Veröffentlicht 09.04.2019 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:42:47

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation...

Exploit
  • EPSS 12.83%
  • Veröffentlicht 09.04.2019 04:29:01
  • Zuletzt bearbeitet 21.11.2024 04:20:04

In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.