Opensuse

Backports Sle

326 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.51%
  • Veröffentlicht 27.12.2019 01:15:13
  • Zuletzt bearbeitet 21.11.2024 04:37:53

An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c.

Exploit
  • EPSS 0.58%
  • Veröffentlicht 27.12.2019 01:15:13
  • Zuletzt bearbeitet 21.11.2024 04:37:53

An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec.

  • EPSS 9.23%
  • Veröffentlicht 24.12.2019 17:15:10
  • Zuletzt bearbeitet 21.11.2024 04:35:40

zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.

  • EPSS 10.52%
  • Veröffentlicht 24.12.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:35:40

flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).

  • EPSS 8.34%
  • Veröffentlicht 23.12.2019 01:15:13
  • Zuletzt bearbeitet 21.11.2024 04:35:41

multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.

Exploit
  • EPSS 0.36%
  • Veröffentlicht 20.12.2019 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:39

Lout 3.40 has a buffer overflow in the StringQuotedWord() function in z39.c.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 20.12.2019 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:39

Lout 3.40 has a heap-based buffer overflow in the srcnext() function in z02.c.

  • EPSS 8.44%
  • Veröffentlicht 18.12.2019 06:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:34

exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.

  • EPSS 0.56%
  • Veröffentlicht 16.12.2019 20:15:15
  • Zuletzt bearbeitet 21.11.2024 04:31:10

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content ...

Exploit
  • EPSS 38.69%
  • Veröffentlicht 10.12.2019 22:15:15
  • Zuletzt bearbeitet 21.11.2024 04:25:40

Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.