Vulnerabilities > Opensuse > Leap > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-12-24 | CVE-2019-19950 | Use After Free vulnerability in multiple products In GraphicsMagick 1.4 snapshot-20190403 Q8, there is a use-after-free in ThrowException and ThrowLoggedException of magick/error.c. | 9.8 |
2019-12-24 | CVE-2019-19951 | Out-of-bounds Write vulnerability in multiple products In GraphicsMagick 1.4 snapshot-20190423 Q8, there is a heap-based buffer overflow in the function ImportRLEPixels of coders/miff.c. | 9.8 |
2019-12-24 | CVE-2019-19953 | Out-of-bounds Read vulnerability in multiple products In GraphicsMagick 1.4 snapshot-20191208 Q8, there is a heap-based buffer over-read in the function EncodeImage of coders/pict.c. | 9.1 |
2019-12-20 | CVE-2019-17571 | Deserialization of Untrusted Data vulnerability in multiple products Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. | 9.8 |
2019-11-29 | CVE-2019-14895 | A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. | 9.8 |
2019-11-26 | CVE-2019-12523 | An issue was discovered in Squid before 4.9. | 9.1 |
2019-11-26 | CVE-2019-12526 | Out-of-bounds Write vulnerability in multiple products An issue was discovered in Squid before 4.9. | 9.8 |
2019-11-22 | CVE-2019-18622 | SQL Injection vulnerability in multiple products An issue was discovered in phpMyAdmin before 4.9.2. | 9.8 |
2019-11-07 | CVE-2019-18805 | Integer Overflow or Wraparound vulnerability in multiple products An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. | 9.8 |
2019-11-04 | CVE-2015-8980 | Improper Input Validation vulnerability in multiple products The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code. | 9.8 |