Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell open enterprise server - vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-3655
Heap-based buffer overflow in Novell Open Enterprise Server Remote Manager (novell-nrm) in Novell SUSE Linux Enterprise Server 9 allows remote malicious users to execute arbitrary code via an HTTP POST request with a negative Content-Length parameter.
Novell Open Enterprise Server 9
10
CVSSv2
CVE-2006-0736
Stack-based buffer overflow in the pam_micasa PAM authentication module in CASA on Novell Linux Desktop 9 and Open Enterprise Server 1 allows remote malicious users to execute arbitrary code via unspecified vectors.
Novell Open Enterprise Server 1
Novell Linux Desktop 9
4.3
CVSSv2
CVE-2009-0611
Multiple cross-site scripting (XSS) vulnerabilities in qfsearch/AdminServlet in QuickFinder Server in Novell Open Enterprise Server 1.x allow remote malicious users to inject arbitrary web script or HTML via (1) the siteloc parameter in a displayaddsite action, the site parameter...
Novell Open Enterprise Server 1.x
1 EDB exploit
7.5
CVSSv2
CVE-2010-4328
Multiple stack-based buffer overflows in opt/novell/iprint/bin/ipsmd in Novell iPrint for Linux Open Enterprise Server 2 SP2 and SP3 allow remote malicious users to execute arbitrary code via unspecified LPR opcodes.
Novell Iprint Open Enterprise Server 2
1 EDB exploit
7.5
CVSSv2
CVE-2011-3173
Stack-based buffer overflow in the GetDriverSettings function in nipplib.dll in the iPrint client in Novell Open Enterprise Server 2 (aka OES2) SP3 allows remote malicious users to execute arbitrary code via a long (1) hostname or (2) port field.
Novell Iprint Open Enterprise Server 2
6.9
CVSSv2
CVE-2013-2016
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matchi...
Qemu Qemu
Qemu Qemu 1.5.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Novell Open Desktop Server 11.0
Novell Open Enterprise Server 11.0
4.9
CVSSv2
CVE-2015-7566
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel up to and including 4.4.1 allows physically proximate malicious users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB...
Novell Suse Linux Enterprise Real Time Extension 12
Novell Suse Linux Enterprise Debuginfo 11
Novell Suse Linux Enterprise Software Development Kit 11
Novell Suse Linux Enterprise Real Time Extension 11
Novell Suse Linux Enterprise Server 11
Linux Linux Kernel
1 EDB exploit
2.1
CVSSv2
CVE-2005-1761
Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.
Novell Open Enterprise Server 9
Novell Linux Desktop 9
Suse Suse Linux 9.0
Suse Suse Linux 9.3
Suse Suse Linux 9.2
Suse Suse Linux 8
Suse Suse Linux 1.0
Suse Suse Linux 9.1
2.1
CVSSv2
CVE-2005-1767
traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).
Novell Open Enterprise Server 9
Novell Linux Desktop 9
Suse Suse Linux 9.0
Suse Suse Linux 9.3
Suse Suse Linux 9.2
Suse Suse Linux 8
Suse Suse Linux 1.0
Suse Suse Linux 9.1
4.1
CVSSv2
CVE-2006-6662
Unspecified vulnerability in Linux User Management (novell-lum) on SUSE Linux Enterprise Desktop 10 and Open Enterprise Server 9, under unspecified conditions, allows local users to log in to the console without a password.
Suse Suse Open Enterprise Server 9
Suse Linux Enterprise Desktop 10
Suse Suse Linux 10
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »