Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse project vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2019-11627
gpg-key2ps in signing-party 1.1.x and 2.x prior to 2.10-1 contains an unsafe shell call enabling shell injection via a User ID.
Signing-party Project Signing-party
Debian Debian Linux 8.0
Opensuse Leap 15.0
Opensuse Leap 42.3
10
CVSSv2
CVE-2016-9961
game-music-emu prior to 0.6.1 mishandles unspecified integer values.
Game-music-emu Project Game-music-emu
Fedoraproject Fedora 25
Fedoraproject Fedora 24
Opensuse Project Leap 42.1
Opensuse Leap 42.2
Novell Suse Linux Enterprise Software Development Kit 12.0
Novell Suse Linux Enterprise Desktop 12.0
Novell Suse Linux Enterprise Server 12.0
10
CVSSv2
CVE-2014-1528
The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote malicious users to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS el...
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 12.04
Opensuse Opensuse 13.1
Opensuse Project Opensuse 12.3
Oracle Solaris 11.3
Mozilla Firefox 28.0
Mozilla Seamonkey 2.25
Fedoraproject Fedora 19
10
CVSSv2
CVE-2013-0422
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote malicious users to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary...
Oracle Jre 1.7.0
Oracle Jdk 1.7.0
Canonical Ubuntu Linux 12.10
Opensuse Opensuse 12.2
1 EDB exploit
16 Github repositories
8 Articles
10
CVSSv2
CVE-2011-4862
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 up to and including 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and previous versions, Heimdal 1.5.1 and previous versions, GNU inetutils, and possibly other products allows remote malicious users...
Gnu Inetutils
Heimdal Project Heimdal
Mit Krb5-appl
Freebsd Freebsd
Fedoraproject Fedora 15
Fedoraproject Fedora 16
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Opensuse Opensuse 11.3
Opensuse Opensuse 11.4
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 9
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Software Development Kit 11
3 EDB exploits
4 Github repositories
1 Article
10
CVSSv2
CVE-2009-0065
Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel prior to 2.6.28-git8 allows remote malicious users to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.
Linux Linux Kernel 2.6.25.4
Linux Linux Kernel 2.6.25.11
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.25.9
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.24.7
Linux Linux Kernel 2.6.23.13
Linux Linux Kernel 2.6.24.2
Linux Linux Kernel 2.4.36.6
Linux Linux Kernel 2.6.26.5
Linux Linux Kernel 2.6.22.21
Linux Linux Kernel 2.6.25.12
Linux Linux Kernel
Linux Linux Kernel 2.6.25.5
Linux Linux Kernel 2.6.23.8
Linux Linux Kernel 2.6.25
Linux Linux Kernel 2.6.22.12
Linux Linux Kernel 2.6.25.8
Linux Linux Kernel 2.6.21.6
Linux Linux Kernel 2.4.36.2
Linux Linux Kernel 2.6.22.1
Linux Linux Kernel 2.6.23.16
1 EDB exploit
9.3
CVSSv2
CVE-2014-1494
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox prior to 28.0 and SeaMonkey prior to 2.25 allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Mozilla Seamonkey
Suse Linux Enterprise Server 11
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Software Development Kit 11
Oracle Solaris 11.3
Opensuse Opensuse 13.1
Opensuse Project Opensuse 12.3
Opensuse Project Opensuse 11.4
Mozilla Firefox
9.3
CVSSv2
CVE-2010-2753
Integer overflow in Mozilla Firefox 3.5.x prior to 3.5.11 and 3.6.x prior to 3.6.7, Thunderbird 3.0.x prior to 3.0.6 and 3.1.x prior to 3.1.1, and SeaMonkey prior to 2.0.6 allows remote malicious users to execute arbitrary code via a large selection attribute in a XUL tree elemen...
Mozilla Firefox
Mozilla Seamonkey
Mozilla Thunderbird 3.1
Mozilla Thunderbird
Suse Linux Enterprise Desktop 11
Opensuse Opensuse 11.1
Suse Linux Enterprise Server 11
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Linux Enterprise Software Development Kit 11
9.3
CVSSv2
CVE-2009-0749
Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread.c in OptiPNG 0.6.2 and previous versions allows context-dependent malicious users to cause a denial of service (application crash) via a crafted GIF image that causes the realloc functio...
Optipng Project Optipng
Suse Linux Enterprise 9-11
Opensuse Opensuse
9.3
CVSSv2
CVE-2008-5021
nsFrameManager in Firefox 3.x prior to 3.0.4, Firefox 2.x prior to 2.0.0.18, Thunderbird 2.x prior to 2.0.0.18, and SeaMonkey 1.x prior to 1.1.13 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a fi...
Mozilla Firefox
Mozilla Seamonkey
Mozilla Thunderbird
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
Fedoraproject Fedora 9
Fedoraproject Fedora 8
Opensuse Opensuse 10.2
Suse Linux Enterprise Server 9
Novell Linux Desktop 9
Opensuse Opensuse 11.0
Opensuse Opensuse 10.3
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Debuginfo 10
Suse Linux Enterprise Server 10
Suse Linux Enterprise Desktop 10
Novell Open Enterprise Server -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »