Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell open enterprise server vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2014-0609
Unspecified vulnerability in Novell Open Enterprise Server (OES) 11 SP1 before Scheduled Maintenance Update 9415 and 11 SP2 before Scheduled Maintenance Update 9413 for Linux has unknown impact and attack vectors.
Novell Open Enterprise Server 11.0
383
VMScore
CVE-2013-3707
The HTTPSTK service in the novell-nrm package prior to 2.0.2-297.305.302.3 in Novell Open Enterprise Server 2 (OES 2) Linux, and OES 11 Linux Gold and SP1, does not make the intended SSL_free and SSL_shutdown calls for the close of a TCP connection, which allows remote malicious ...
Novell Open Enterprise Server 11.0
890
VMScore
CVE-2006-0736
Stack-based buffer overflow in the pam_micasa PAM authentication module in CASA on Novell Linux Desktop 9 and Open Enterprise Server 1 allows remote malicious users to execute arbitrary code via unspecified vectors.
Novell Linux Desktop 9
Novell Open Enterprise Server 1
435
VMScore
CVE-2009-0611
Multiple cross-site scripting (XSS) vulnerabilities in qfsearch/AdminServlet in QuickFinder Server in Novell Open Enterprise Server 1.x allow remote malicious users to inject arbitrary web script or HTML via (1) the siteloc parameter in a displayaddsite action, the site parameter...
Novell Open Enterprise Server 1.x
1 EDB exploit
755
VMScore
CVE-2010-4328
Multiple stack-based buffer overflows in opt/novell/iprint/bin/ipsmd in Novell iPrint for Linux Open Enterprise Server 2 SP2 and SP3 allow remote malicious users to execute arbitrary code via unspecified LPR opcodes.
Novell Iprint Open Enterprise Server 2
1 EDB exploit
668
VMScore
CVE-2011-3173
Stack-based buffer overflow in the GetDriverSettings function in nipplib.dll in the iPrint client in Novell Open Enterprise Server 2 (aka OES2) SP3 allows remote malicious users to execute arbitrary code via a long (1) hostname or (2) port field.
Novell Iprint Open Enterprise Server 2
614
VMScore
CVE-2013-2016
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matchi...
Qemu Qemu 1.5.0
Qemu Qemu
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Novell Open Desktop Server 11.0
Novell Open Enterprise Server 11.0
187
VMScore
CVE-2005-1761
Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.
Novell Open Enterprise Server 9
Novell Linux Desktop 9
Suse Suse Linux 9.0
Suse Suse Linux 9.3
Suse Suse Linux 9.2
Suse Suse Linux 8
Suse Suse Linux 1.0
Suse Suse Linux 9.1
187
VMScore
CVE-2005-1767
traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).
Novell Open Enterprise Server 9
Novell Linux Desktop 9
Suse Suse Linux 9.0
Suse Suse Linux 9.3
Suse Suse Linux 9.2
Suse Suse Linux 8
Suse Suse Linux 1.0
Suse Suse Linux 9.1
495
VMScore
CVE-2015-7566
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel up to and including 4.4.1 allows physically proximate malicious users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB...
Novell Suse Linux Enterprise Server 11
Novell Suse Linux Enterprise Debuginfo 11
Novell Suse Linux Enterprise Software Development Kit 11
Novell Suse Linux Enterprise Real Time Extension 11
Novell Suse Linux Enterprise Real Time Extension 12
Linux Linux Kernel
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »