Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse linux enterprise real time extension 12 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2959
Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel prior to 2.6.27.53, 2.6.32.x prior to 2.6.32.21, 2.6.34.x prior to 2.6.34.6, and 2.6.35.x prior to 2.6.35.4 allows malicious users to execute arbitrary code or cause a denial...
Linux Linux Kernel
Fedoraproject Fedora 12
Debian Debian Linux 5.0
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 11
Opensuse Opensuse 11.3
Suse Linux Enterprise High Availability Extension 11
Suse Linux Enterprise Real Time 11
1 EDB exploit
21 Github repositories
4.6
CVSSv3
CVE-2016-3951
Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel prior to 4.5 allows physically proximate malicious users to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Novell Suse Linux Enterprise Desktop 12
Novell Suse Linux Enterprise Module For Public Cloud 12
Novell Suse Linux Enterprise Real Time Extension 12
Novell Suse Linux Enterprise Software Development Kit 12.0
Novell Suse Linux Enterprise Workstation Extension 12.0
Novell Suse Linux Enterprise Server 12.0
Novell Suse Linux Enterprise Live Patching 12.0
Suse Suse Linux Enterprise Software Development Kit 12.0
Linux Linux Kernel 4.5.0
4.4
CVSSv3
CVE-2015-8552
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x up to and including 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a s...
Xen Xen 4.3.3
Xen Xen 4.3.2
Xen Xen 4.2.1
Xen Xen 4.2.0
Xen Xen 4.1.0
Xen Xen 4.0.4
Xen Xen 3.4.2
Xen Xen 3.4.1
Xen Xen 3.2.1
Xen Xen 3.2.0
Xen Xen 4.3.1
Xen Xen 4.3.0
Xen Xen 4.1.6.1
Xen Xen 4.1.6
Xen Xen 4.0.3
Xen Xen 4.0.2
Xen Xen 3.4.0
Xen Xen 3.3.2
Xen Xen 3.1.4
Xen Xen 3.1.3
Xen Xen 4.2.5
Xen Xen 4.2.4
7
CVSSv3
CVE-2017-2624
It was found that xorg-x11-server prior to 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is...
X.org Xorg-server
Debian Debian Linux 7.0
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2