Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.67%
  • Veröffentlicht 01.04.2015 10:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which al...

  • EPSS 1.67%
  • Veröffentlicht 01.04.2015 10:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 makes an incorrect memset call during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execut...

  • EPSS 1.67%
  • Veröffentlicht 01.04.2015 10:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or c...

  • EPSS 1.67%
  • Veröffentlicht 01.04.2015 10:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary c...

  • EPSS 80.39%
  • Veröffentlicht 01.04.2015 10:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content...

  • EPSS 35.31%
  • Veröffentlicht 01.04.2015 02:00:35
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial ...

Exploit
  • EPSS 30.48%
  • Veröffentlicht 30.03.2015 10:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary co...

Exploit
  • EPSS 12.74%
  • Veröffentlicht 30.03.2015 10:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an a...

Exploit
  • EPSS 16.54%
  • Veröffentlicht 30.03.2015 10:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperl...

Exploit
  • EPSS 2.99%
  • Veröffentlicht 27.03.2015 14:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by perfor...