Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 24 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2016-7972
The check_allocations function in libass/ass_shaper.c in libass prior to 0.13.4 allows remote malicious users to cause a denial of service (memory allocation failure) via unspecified vectors.
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Fedoraproject Fedora 25
Fedoraproject Fedora 24
Fedoraproject Fedora 23
Libass Project Libass
7.5
CVSSv3
CVE-2016-9956
The route manager in FlightGear prior to 2016.4.4 allows remote malicious users to write to arbitrary files via a crafted Nasal script.
Debian Debian Linux 8.0
Fedoraproject Fedora 25
Fedoraproject Fedora 24
Flightgear Flightgear
7.5
CVSSv3
CVE-2016-6866
slock allows malicious users to bypass the screen lock via vectors involving an invalid password hash, which triggers a NULL pointer dereference and crash.
Suckless Slock
Fedoraproject Fedora 25
Fedoraproject Fedora 24
7.5
CVSSv3
CVE-2016-9108
Integer overflow in the js_regcomp function in regexp.c in Artifex Software, Inc. MuJS before commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e allows malicious users to cause a denial of service (application crash) via a crafted regular expression.
Fedoraproject Fedora 25
Fedoraproject Fedora 24
Fedoraproject Fedora 23
Artifex Mujs
7.5
CVSSv3
CVE-2016-6515
The auth_password function in auth-passwd.c in sshd in OpenSSH prior to 7.3 does not limit password lengths for password authentication, which allows remote malicious users to cause a denial of service (crypt CPU consumption) via a long string.
Openbsd Openssh
Fedoraproject Fedora 24
1 EDB exploit
3 Github repositories
7.5
CVSSv3
CVE-2016-5244
The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel up to and including 4.6.3 does not initialize a certain structure member, which allows remote malicious users to obtain sensitive information from kernel stack memory by reading an RDS message.
Fedoraproject Fedora 23
Suse Linux Enterprise Real Time Extension 11
Fedoraproject Fedora 24
Suse Linux Enterprise Debuginfo 11
Suse Linux Enterprise Real Time Extension 12
Suse Linux Enterprise Server 11
Redhat Enterprise Linux 6.0
Suse Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Workstation Extension 12
Redhat Enterprise Linux 5
Suse Linux Enterprise Desktop 12
Suse Opensuse Leap 42.1
Suse Suse Linux Enterprise Software Development Kit 12
Fedoraproject Fedora 22
Linux Linux Kernel
Suse Suse Linux Enterprise Server 12
7.5
CVSSv3
CVE-2016-4414
The onReadyRead function in core/coreauthhandler.cpp in Quassel prior to 0.12.4 allows remote malicious users to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Quassel-irc Quassel
Fedoraproject Fedora 22
Fedoraproject Fedora 24
Fedoraproject Fedora 23
7.5
CVSSv3
CVE-2016-4021
The read_binary function in buffer.c in pgpdump prior to 0.30 allows context-dependent malicious users to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
Fedoraproject Fedora 23
Fedoraproject Fedora 22
Fedoraproject Fedora 24
Pgpdump Project Pgpdump
7.5
CVSSv3
CVE-2015-7827
Botan prior to 1.10.13 and 1.11.x prior to 1.11.22 make it easier for remote malicious users to conduct million-message attacks by measuring time differences, related to decoding of PKCS#1 padding.
Fedoraproject Fedora 24
Botan Project Botan 1.11.20
Botan Project Botan 1.11.15
Botan Project Botan 1.11.13
Botan Project Botan 1.11.6
Botan Project Botan 1.11.4
Botan Project Botan 1.11.11
Botan Project Botan 1.11.10
Botan Project Botan 1.11.9
Botan Project Botan 1.11.8
Botan Project Botan 1.11.19
Botan Project Botan 1.11.18
Botan Project Botan 1.11.17
Botan Project Botan 1.11.16
Botan Project Botan 1.11.2
Botan Project Botan 1.11.1
Botan Project Botan 1.11.0
Botan Project Botan
Botan Project Botan 1.11.21
Botan Project Botan 1.11.14
Botan Project Botan 1.11.12
Botan Project Botan 1.11.7
7.5
CVSSv3
CVE-2016-2849
Botan prior to 1.10.13 and 1.11.x prior to 1.11.29 do not use a constant-time algorithm to perform a modular inverse on the signature nonce k, which might allow remote malicious users to obtain ECDSA secret keys via a timing side-channel attack.
Debian Debian Linux 8.0
Fedoraproject Fedora 24
Botan Project Botan 1.11.22
Botan Project Botan 1.11.21
Botan Project Botan 1.11.14
Botan Project Botan 1.11.13
Botan Project Botan 1.11.12
Botan Project Botan 1.11.5
Botan Project Botan 1.11.4
Botan Project Botan 1.11.26
Botan Project Botan 1.11.25
Botan Project Botan 1.11.18
Botan Project Botan 1.11.17
Botan Project Botan 1.11.9
Botan Project Botan 1.11.8
Botan Project Botan 1.11.1
Botan Project Botan 1.11.0
Botan Project Botan 1.11.28
Botan Project Botan 1.11.27
Botan Project Botan 1.11.20
Botan Project Botan 1.11.19
Botan Project Botan 1.11.11
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »