Opensuse

Opensuse

1454 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.3%
  • Veröffentlicht 08.03.2015 02:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via...

  • EPSS 0.34%
  • Veröffentlicht 08.03.2015 02:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and applicatio...

  • EPSS 0.25%
  • Veröffentlicht 08.03.2015 02:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial ...

  • EPSS 18.72%
  • Veröffentlicht 08.03.2015 02:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script ha...

  • EPSS 2.9%
  • Veröffentlicht 02.03.2015 11:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass in...

  • EPSS 0.51%
  • Veröffentlicht 25.02.2015 11:59:14
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The WebRTC subsystem in Mozilla Firefox before 36.0 recognizes turns: and stuns: URIs but accesses the TURN or STUN server without using TLS, which makes it easier for man-in-the-middle attackers to discover credentials by spoofing a server and compl...

  • EPSS 0.05%
  • Veröffentlicht 25.02.2015 11:59:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a T...

  • EPSS 0.12%
  • Veröffentlicht 25.02.2015 11:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 36.0 does not properly recognize the equivalence of domain names with and without a trailing . (dot) character, which allows man-in-the-middle attackers to bypass the HPKP and HSTS protection mechanisms by constructing a URL wi...

  • EPSS 2.18%
  • Veröffentlicht 25.02.2015 11:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in libstagefright in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code via a crafted MP4 video that is improperly handled during playback.

  • EPSS 0.94%
  • Veröffentlicht 25.02.2015 11:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebG...