Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse opensuse 11.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-9601
Pillow prior to 2.7.0 allows remote malicious users to cause a denial of service via a compressed text chunk in a PNG image that has a large size when it is decompressed.
Python Pillow
Oracle Solaris 11.2
Fedoraproject Fedora 21
Opensuse Opensuse 13.2
NA
CVE-2015-0561
asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x prior to 1.10.12 and 1.12.x prior to 1.12.3 does not validate a certain index value, which allows remote malicious users to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet...
Wireshark Wireshark 1.10.8
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.10.6
Wireshark Wireshark 1.10.9
Wireshark Wireshark 1.10.10
Wireshark Wireshark 1.10.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.10.3
Wireshark Wireshark 1.10.2
Wireshark Wireshark 1.10.1
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.10.7
Wireshark Wireshark 1.10.4
Wireshark Wireshark 1.10.5
Wireshark Wireshark 1.10.11
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Oracle Solaris 11.2
NA
CVE-2014-5353
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) prior to 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query wit...
Mit Kerberos 5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.6
Redhat Enterprise Linux Eus 7.3
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 6.6
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 22
Debian Debian Linux 7.0
NA
CVE-2014-8124
OpenStack Dashboard (Horizon) prior to 2014.1.3 and 2014.2.x prior to 2014.2.1 does not properly handle session records when using a db or memcached session engine, which allows remote malicious users to cause a denial of service via a large number of requests to the login page.
Openstack Horizon
Fedoraproject Fedora 21
Opensuse Opensuse 13.1
Oracle Solaris 11.2
NA
CVE-2014-8768
Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 up to and including 4.6.2, when in verbose mode, allow remote malicious users to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Oracle Solaris 11.2
Redhat Tcpdump 4.6.2
Redhat Tcpdump 4.6.0
Redhat Tcpdump 4.6.1
Redhat Tcpdump 4.5.1
Redhat Tcpdump 4.5.2
Redhat Tcpdump 4.5.0
1 EDB exploit
NA
CVE-2014-5459
The PEAR_REST class in REST.php in PEAR in PHP up to and including 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
Php Php
Oracle Solaris 11.2
Opensuse Evergreen 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
NA
CVE-2011-2198
The "insert-blank-characters" capability in caps.c in gnome-terminal (vte) prior to 0.28.1 allows remote authenticated users to cause a denial of service (CPU and memory consumption and crash) via a crafted file, as demonstrated by a file containing the string "\03...
Gnome Gnome-terminal
Opensuse Opensuse 12.1
Opensuse Opensuse 11.4
Oracle Solaris 11.2
NA
CVE-2011-0460
The init script in kbd, possibly 1.14.1 and previous versions, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.
Kbd-project Kbd
Kbd-project Kbd 1.14
Kbd-project Kbd 1.13
Kbd-project Kbd 1.05
Kbd-project Kbd 1.04
Kbd-project Kbd 1.03
Kbd-project Kbd 1.01
Kbd-project Kbd 1.11
Kbd-project Kbd 1.08
Opensuse Opensuse 11.2
Kbd-project Kbd 1.12
Kbd-project Kbd 1.10
Kbd-project Kbd 1.06
Kbd-project Kbd 0.99
Opensuse Opensuse 11.3
NA
CVE-2011-4091
The libobby server in inc/server.hpp in libnet6 (aka net6) prior to 1.3.14 does not perform authentication before checking the user name, which allows remote malicious users to obtain sensitive information such as server-usage patterns by a particular user and color preferences.
Opensuse Opensuse 11.4
Opensuse Opensuse 11.3
Oracle Solaris 11.2
Armin Burgmeier Net6
Armin Burgmeier Net6 1.3.5
Armin Burgmeier Net6 1.3.9
Armin Burgmeier Net6 1.3.7
Armin Burgmeier Net6 1.3.1
Armin Burgmeier Net6 1.3.12
Armin Burgmeier Net6 1.3.6
Armin Burgmeier Net6 1.3.4
Armin Burgmeier Net6 1.3.2
Armin Burgmeier Net6 1.3.11
Armin Burgmeier Net6 1.3.10
Armin Burgmeier Net6 1.3.3
Armin Burgmeier Net6 1.3.8
NA
CVE-2011-4093
Integer overflow in inc/server.hpp in libnet6 (aka net6) prior to 1.3.14 might allow remote malicious users to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.
Oracle Solaris 11.2
Armin Burgmeier Net6
Armin Burgmeier Net6 1.3.5
Armin Burgmeier Net6 1.3.9
Armin Burgmeier Net6 1.3.7
Armin Burgmeier Net6 1.3.1
Armin Burgmeier Net6 1.3.12
Armin Burgmeier Net6 1.3.6
Armin Burgmeier Net6 1.3.4
Armin Burgmeier Net6 1.3.2
Armin Burgmeier Net6 1.3.11
Armin Burgmeier Net6 1.3.10
Armin Burgmeier Net6 1.3.3
Armin Burgmeier Net6 1.3.8
Opensuse Project Opensuse 11.4
Opensuse Opensuse 11.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »