Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse opensuse 11.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-0310
Buffer overflow in SUSE blinux (aka sbl) in SUSE openSUSE 10.3 up to and including 11.0 has unknown impact and attack vectors related to "incoming data and authentication-strings."
Opensuse Opensuse 11.0
Opensuse Opensuse 10.3
NA
CVE-2009-0848
Untrusted search path vulnerability in GTK2 in OpenSUSE 11.0 and 11.1 allows local users to execute arbitrary code via a Trojan horse GTK module in an unspecified "relative search path."
Opensuse Opensuse 11.1
Opensuse Opensuse 11.0
7.5
CVSSv3
CVE-2008-3188
libxcrypt in SUSE openSUSE 11.0 uses the DES algorithm when the configuration specifies the MD5 algorithm, which makes it easier for malicious users to conduct brute-force attacks against hashed passwords.
Opensuse Opensuse 11.0
NA
CVE-2008-3187
zypp-refresh-patches in zypper in SUSE openSUSE 10.2, 10.3, and 11.0 does not ask the user before accepting repository keys, which allows remote repositories to cause a denial of service (package data corruption) via a spoofed key.
Opensuse Zypper 10.2
Opensuse Zypper 10.3
Opensuse Zypper 11.0
9.8
CVSSv3
CVE-2010-1866
The dechunk filter in PHP 5.3 up to and including 5.3.2, when decoding an HTTP chunked encoding stream, allows context-dependent malicious users to cause a denial of service (crash) and possibly trigger memory corruption via a negative chunk size, which bypasses a signed comparis...
Php Php
Opensuse Opensuse 11.1
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Linux Enterprise 11.0
Suse Linux Enterprise 10.0
1 EDB exploit
5.5
CVSSv3
CVE-2008-1567
phpMyAdmin prior to 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.
Phpmyadmin Phpmyadmin
Debian Debian Linux 4.0
Fedoraproject Fedora 8
Fedoraproject Fedora 7
Opensuse Opensuse 10.2
Opensuse Opensuse 11.0
Opensuse Opensuse 10.3
7.8
CVSSv3
CVE-2009-3289
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
Gnome Glib 2.0
Opensuse Opensuse 11.1
Opensuse Opensuse 11.0
Suse Suse Linux Enterprise Server 11
NA
CVE-2007-5729
The NE2000 emulator in QEMU 0.8.2 allows local users to execute arbitrary code by writing Ethernet frames with a size larger than the MTU to the EN0_TCNT register, which triggers a heap-based buffer overflow in the slirp library, aka NE2000 "mtu" heap overflow. NOTE: so...
Qemu Qemu 0.8.2
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Opensuse Opensuse 11.1
Opensuse Opensuse 11.0
8.8
CVSSv3
CVE-2010-0012
Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote malicious users to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file.
Transmissionbt Transmission 1.22
Transmissionbt Transmission 1.75
Transmissionbt Transmission 1.76
Transmissionbt Transmission 1.34
Debian Debian Linux 5.0
Opensuse Opensuse 11.1
Opensuse Opensuse 11.0
Opensuse Opensuse 11.2
6.5
CVSSv3
CVE-2010-0629
Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 up to and including 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version nu...
Mit Kerberos 5
Fedoraproject Fedora 11
Opensuse Opensuse 11.1
Opensuse Opensuse 11.0
Suse Linux Enterprise 11.0
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 8.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »