Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2014-8642
Mozilla Firefox prior to 35.0 and SeaMonkey prior to 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote malicious users to obtain sensitive information by sniffing the network during a session i...
Mozilla Seamonkey
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mozilla Firefox
445
VMScore
CVE-2014-3985
The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote malicious users to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
Miniupnp Project Miniupnp 1.9
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
605
VMScore
CVE-2014-2576
plugins/rssyl/feed.c in Claws Mail prior to 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote malicious users to spoof servers and conduct man-in-the-middle (MITM) attacks.
Claws-mail Claws-mail
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
641
VMScore
CVE-2014-8148
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Midgard-project Midgard2 10.05.7.1
445
VMScore
CVE-2014-9640
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote malicious users to cause a denial of service (out-of-bounds read) via a crafted raw file.
Xiph Vorbis-tools 1.4.0
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
445
VMScore
CVE-2015-2141
The InvertibleRWFunction::CalculateInverse function in rw.cpp in libcrypt++ 5.6.2 does not properly blind private key operations for the Rabin-Williams digital signature algorithm, which allows remote malicious users to obtain private keys via a timing attack.
Cryptopp Crypto\\+\\+ Library 5.6.2
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
935
VMScore
CVE-2015-7805
Heap-based buffer overflow in libsndfile 1.0.25 allows remote malicious users to have unspecified impact via the headindex value in the header in an AIFF file.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mega-nerd Libsndfile 1.0.25
1 EDB exploit
294
VMScore
CVE-2013-2475
The TCP dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
543
VMScore
CVE-2013-2476
The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (infinite loop) via a packet with a header that is too short.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.5
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
294
VMScore
CVE-2013-2479
The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (infinite loop) via invalid Sub-tlv data.
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »