Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse opensuse 12.2 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2013-4508
lighttpd prior to 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote malicious users to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
Lighttpd Lighttpd
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
7.6
CVSSv2
CVE-2013-4559
lighttpd prior to 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote malicious users to gain privileges, as demonstrated by multiple calls to the clone fu...
Lighttpd Lighttpd
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
5
CVSSv2
CVE-2013-4560
Use-after-free vulnerability in lighttpd prior to 1.4.33 allows remote malicious users to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.
Lighttpd Lighttpd
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
4.4
CVSSv2
CVE-2013-2145
The cpansign verify functionality in the Module::Signature module prior to 0.72 for Perl allows malicious users to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 12.04
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Perlmonks Module\\ \\
4.3
CVSSv2
CVE-2012-2751
ModSecurity prior to 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote malicious users to bypass fil...
Trustwave Modsecurity
Opensuse Opensuse 12.3
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Oracle Http Server 11.1.1.6.0
7.5
CVSSv2
CVE-2013-0894
Buffer overflow in the vorbis_parse_setup_hdr_floors function in the Vorbis decoder in vorbisdec.c in libavcodec in FFmpeg up to and including 1.1.3, as used in Google Chrome prior to 25.0.1364.97 on Windows and Linux and prior to 25.0.1364.99 on Mac OS X and other products, allo...
Google Chrome
Ffmpeg Ffmpeg
Opensuse Opensuse 12.2
Opensuse Opensuse 12.1
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
1.2
CVSSv2
CVE-2013-2217
cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/.
Jeff Ortel Suds 0.4
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 5
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
3.3
CVSSv2
CVE-2013-2475
The TCP dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
6.1
CVSSv2
CVE-2013-2476
The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (infinite loop) via a packet with a header that is too short.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.5
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
3.3
CVSSv2
CVE-2013-2479
The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x prior to 1.8.6 allows remote malicious users to cause a denial of service (infinite loop) via invalid Sub-tlv data.
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »