Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2014-9639 |
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access. Published: January 23, 2015; 10:59:09 AM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2014-9638 |
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero. Published: January 23, 2015; 10:59:07 AM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2014-7943 |
Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. Published: January 22, 2015; 5:59:23 PM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2014-7942 |
The Fonts implementation in Google Chrome before 40.0.2214.91 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Published: January 22, 2015; 5:59:22 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2014-7941 |
The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data. Published: January 22, 2015; 5:59:21 PM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2014-7939 |
Google Chrome before 40.0.2214.91, when the Harmony proxy in Google V8 is enabled, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code with Proxy.create and console.log calls, related to HTTP responses that lack an "X-Content-Type-Options: nosniff" header. Published: January 22, 2015; 5:59:20 PM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2014-7926 |
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier. Published: January 22, 2015; 5:59:07 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2014-7923 |
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression. Published: January 22, 2015; 5:59:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2015-0427 |
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, and CVE-2014-6595. Published: January 21, 2015; 2:59:13 PM -0500 |
V3.x:(not available) V2.0: 3.2 LOW |
CVE-2015-0418 |
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, and 4.2.28 allows local users to affect availability via unknown vectors related to Core, a different vulnerability than CVE-2015-0377. Published: January 21, 2015; 2:59:06 PM -0500 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2015-0412 |
Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS. Published: January 21, 2015; 2:59:01 PM -0500 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2015-1196 |
GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file. Published: January 21, 2015; 1:59:57 PM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2015-0410 |
Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security. Published: January 21, 2015; 1:59:50 PM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2015-0408 |
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. Published: January 21, 2015; 1:59:48 PM -0500 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-2015-0400 |
Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Libraries. Published: January 21, 2015; 1:59:42 PM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2015-0395 |
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. Published: January 21, 2015; 1:59:38 PM -0500 |
V3.x:(not available) V2.0: 9.3 HIGH |
CVE-2015-0383 |
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot. Published: January 21, 2015; 1:59:28 PM -0500 |
V3.x:(not available) V2.0: 5.4 MEDIUM |
CVE-2015-0377 |
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, and 4.2.28 allows local users to affect availability via unknown vectors related to Core, a different vulnerability than CVE-2015-0418. Published: January 21, 2015; 1:59:23 PM -0500 |
V3.x:(not available) V2.0: 4.4 MEDIUM |
CVE-2014-6601 |
Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. Published: January 21, 2015; 1:59:03 PM -0500 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-2014-6595 |
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, and CVE-2015-0427. Published: January 21, 2015; 10:28:31 AM -0500 |
V3.x:(not available) V2.0: 3.2 LOW |