Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse leap 15.2 vulnerabilities and exploits
(subscribe to this query)
676
VMScore
CVE-2020-12422
In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.
Mozilla Firefox
Opensuse Leap 15.1
Opensuse Leap 15.2
642
VMScore
CVE-2020-25637
A double free memory issue was found to occur in the libvirt API, in versions prior to 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read...
Redhat Libvirt
Opensuse Leap 15.1
Opensuse Leap 15.2
2 Github repositories
446
VMScore
CVE-2020-14039
In Go prior to 1.13.13 and 1.14.x prior to 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.
Golang Go
Opensuse Leap 15.1
Opensuse Leap 15.2
397
VMScore
CVE-2020-14308
In grub2 versions prior to 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and...
Gnu Grub2
Opensuse Leap 15.1
Opensuse Leap 15.2
414
VMScore
CVE-2020-14309
There's an issue with grub2 in all versions prior to 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buff...
Gnu Grub2
Opensuse Leap 15.1
Opensuse Leap 15.2
642
VMScore
CVE-2020-8026
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-...
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Opensuse Tumbleweed
614
VMScore
CVE-2020-8903
A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "adm" group, users with this ...
Google Guest-oslogin
Opensuse Leap 15.1
Opensuse Leap 15.2
614
VMScore
CVE-2020-8933
A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using the membership to the "lxd" group, an attacker can at...
Google Guest-oslogin
Opensuse Leap 15.1
Opensuse Leap 15.2
392
VMScore
CVE-2020-0305
In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-15346...
Google Android 10.0
Opensuse Leap 15.1
Opensuse Leap 15.2
436
VMScore
CVE-2020-14629
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »