Opensuse

Backports Sle

326 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.06%
  • Veröffentlicht 17.04.2019 14:29:04
  • Zuletzt bearbeitet 21.11.2024 04:51:44

The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication,...

  • EPSS 1.54%
  • Veröffentlicht 17.04.2019 14:29:03
  • Zuletzt bearbeitet 21.11.2024 04:51:43

The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that...

  • EPSS 6.03%
  • Veröffentlicht 17.04.2019 14:29:03
  • Zuletzt bearbeitet 21.11.2024 04:51:43

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execu...

  • EPSS 2.23%
  • Veröffentlicht 08.04.2019 19:29:05
  • Zuletzt bearbeitet 21.11.2024 04:20:20

In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.

Exploit
  • EPSS 2.35%
  • Veröffentlicht 08.04.2019 19:29:05
  • Zuletzt bearbeitet 21.11.2024 04:20:20

In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer overflow in the function WriteXWDImage of coders/xwd.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 07.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:19:49

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This ...

  • EPSS 2.28%
  • Veröffentlicht 21.03.2019 16:01:17
  • Zuletzt bearbeitet 21.11.2024 04:52:31

In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.

Exploit
  • EPSS 2.43%
  • Veröffentlicht 14.03.2019 09:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:17

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer over-read in the function dxf_header_write at header_variables_dxf.spec.

Exploit
  • EPSS 2.43%
  • Veröffentlicht 14.03.2019 09:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:18

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer over-read in the function dwg_dxf_LTYPE at dwg.spec.

Exploit
  • EPSS 2.44%
  • Veröffentlicht 14.03.2019 09:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:18

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function dwg_dxf_LTYPE at dwg.spec (earlier than CVE-2019-9776).