Opensuse

Opensuse

1454 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung
  • EPSS 92.91%
  • Veröffentlicht 23.06.2015 21:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in...

  • EPSS 1.31%
  • Veröffentlicht 15.06.2015 15:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) v...

  • EPSS 1.21%
  • Veröffentlicht 15.06.2015 15:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

  • EPSS 1.21%
  • Veröffentlicht 15.06.2015 15:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a craft...

  • EPSS 1.21%
  • Veröffentlicht 15.06.2015 15:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.

  • EPSS 7.07%
  • Veröffentlicht 15.06.2015 15:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which ...

  • EPSS 1.47%
  • Veröffentlicht 15.06.2015 15:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-boun...

  • EPSS 3.36%
  • Veröffentlicht 07.06.2015 23:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or po...

  • EPSS 0.05%
  • Veröffentlicht 02.06.2015 14:59:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

GNU Parallel before 20150522 (Nepal), when using (1) --cat or (2) --fifo with --sshlogin, allows local users to write to arbitrary files via a symlink attack on a temporary file.

  • EPSS 0.05%
  • Veröffentlicht 18.05.2015 15:59:15
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.