Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent malicious users to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the ...
Redhat Enterprise Linux 6.0
Opensuse Opensuse 12.2
Opensuse Opensuse 12.1
1 EDB exploit
NA
CVE-2014-3985
The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote malicious users to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
Miniupnp Project Miniupnp 1.9
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
8.8
CVSSv3
CVE-2010-1822
WebKit, as used in Apple Safari prior to 4.1.3 and 5.0.x prior to 5.0.3 and Google Chrome prior to 6.0.472.62, does not properly perform a cast of an unspecified variable, which allows remote malicious users to execute arbitrary code or cause a denial of service (application cras...
Apple Safari
Google Chrome
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
NA
CVE-2014-2576
plugins/rssyl/feed.c in Claws Mail prior to 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote malicious users to spoof servers and conduct man-in-the-middle (MITM) attacks.
Claws-mail Claws-mail
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
NA
CVE-2014-8148
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Midgard-project Midgard2 10.05.7.1
NA
CVE-2014-8640
The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox prior to 35.0 and SeaMonkey prior to 2.32 does not properly restrict timeline operations, which allows remote malicious users to cause a denial of service (un...
Mozilla Firefox
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Mozilla Seamonkey
NA
CVE-2014-8642
Mozilla Firefox prior to 35.0 and SeaMonkey prior to 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote malicious users to obtain sensitive information by sniffing the network during a session i...
Mozilla Seamonkey
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mozilla Firefox
NA
CVE-2013-2479
The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (infinite loop) via invalid Sub-tlv data.
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
NA
CVE-2013-2476
The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (infinite loop) via a packet with a header that is too short.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.5
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
NA
CVE-2013-2475
The TCP dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
open redirect
CVE-2024-3946
LFI
CVE-2024-25977
CVE-2024-36368
CVE-2024-23109
CVE-2024-23580
CVE-2024-23108
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »