Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell suse linux enterprise real time extension 12 vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2015-7566
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel up to and including 4.4.1 allows physically proximate malicious users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB...
Novell Suse Linux Enterprise Real Time Extension 12
Novell Suse Linux Enterprise Debuginfo 11
Novell Suse Linux Enterprise Software Development Kit 11
Novell Suse Linux Enterprise Real Time Extension 11
Novell Suse Linux Enterprise Server 11
Linux Linux Kernel
1 EDB exploit
4.9
CVSSv2
CVE-2015-7833
The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 up to and including 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate malicious users to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB devic...
Novell Suse Linux Enterprise Real Time Extension 12
Redhat Enterprise Linux 7.1
5.7
CVSSv2
CVE-2015-8550
Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
Xen Xen -
Novell Suse Linux Enterprise Real Time Extension 12
1 Github repository
7.2
CVSSv2
CVE-2015-8816
The hub_activate function in drivers/usb/core/hub.c in the Linux kernel prior to 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate malicious users to cause a denial of service (invalid memory access and system crash) or possibly ha...
Novell Suse Linux Enterprise Server 12.0
Novell Suse Linux Enterprise Server 11
Novell Suse Linux Enterprise Debuginfo 11
Novell Suse Linux Enterprise Live Patching 12.0
Novell Suse Linux Enterprise Real Time Extension 11
Novell Suse Linux Enterprise Desktop 12.0
Novell Suse Linux Enterprise Module For Public Cloud 12
Novell Suse Linux Enterprise Workstation Extension 12.0
Novell Suse Linux Enterprise Software Development Kit 11.0
Novell Suse Linux Enterprise Real Time Extension 12
Novell Suse Linux Enterprise Software Development Kit 12.0
Linux Linux Kernel
Suse Linux Enterprise Server 12
Suse Linux Enterprise Live Patching 12
4.9
CVSSv2
CVE-2016-3951
Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel prior to 4.5 allows physically proximate malicious users to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Novell Suse Linux Enterprise Desktop 12
Novell Suse Linux Enterprise Module For Public Cloud 12
Novell Suse Linux Enterprise Real Time Extension 12
Novell Suse Linux Enterprise Software Development Kit 12.0
Novell Suse Linux Enterprise Workstation Extension 12.0
Novell Suse Linux Enterprise Server 12.0
Novell Suse Linux Enterprise Live Patching 12.0
Suse Suse Linux Enterprise Software Development Kit 12.0
Linux Linux Kernel 4.5.0
1.7
CVSSv2
CVE-2015-8552
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x up to and including 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a s...
Xen Xen 4.3.3
Xen Xen 4.3.2
Xen Xen 4.2.1
Xen Xen 4.2.0
Xen Xen 4.1.0
Xen Xen 4.0.4
Xen Xen 3.4.2
Xen Xen 3.4.1
Xen Xen 3.2.1
Xen Xen 3.2.0
Xen Xen 4.3.1
Xen Xen 4.3.0
Xen Xen 4.1.6.1
Xen Xen 4.1.6
Xen Xen 4.0.3
Xen Xen 4.0.2
Xen Xen 3.4.0
Xen Xen 3.3.2
Xen Xen 3.1.4
Xen Xen 3.1.3
Xen Xen 4.2.5
Xen Xen 4.2.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-21111
CVE-2024-32884
IDOR
CVE-2023-1000
CVE-2024-33260
CVE-2024-3682
reflected XSS
race condition
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started