Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse linux enterprise server 11 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv3
CVE-2015-7976
The ntpq saveconfig command in NTP 4.1.2, 4.2.x prior to 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows malicious users to cause unspecified impact via a crafted filename.
Ntp Ntp 4.1.2
Ntp Ntp
Ntp Ntp 4.3.0
Ntp Ntp 4.3.1
Ntp Ntp 4.3.16
Ntp Ntp 4.3.17
Ntp Ntp 4.3.24
Ntp Ntp 4.3.25
Ntp Ntp 4.3.31
Ntp Ntp 4.3.32
Ntp Ntp 4.3.39
Ntp Ntp 4.3.4
Ntp Ntp 4.3.47
Ntp Ntp 4.3.48
Ntp Ntp 4.3.54
Ntp Ntp 4.3.55
Ntp Ntp 4.3.61
Ntp Ntp 4.3.62
Ntp Ntp 4.3.63
Ntp Ntp 4.3.7
Ntp Ntp 4.3.70
Ntp Ntp 4.3.77
7.5
CVSSv3
CVE-2016-4957
ntpd in NTP prior to 4.2.8p8 allows remote malicious users to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
Ntp Ntp 4.2.8
Ntp Ntp 4.3.92
Oracle Solaris 10
Oracle Solaris 11.3
Suse Manager Proxy 2.1
Suse Openstack Cloud 5
Novell Suse Manager 2.1
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 12
7.5
CVSSv3
CVE-2016-4953
ntpd in NTP 4.x prior to 4.2.8p8 allows remote malicious users to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
Ntp Ntp
Ntp Ntp 4.2.8
Oracle Solaris 10
Oracle Solaris 11.3
Suse Manager 2.1
Suse Manager Proxy 2.1
Suse Openstack Cloud 5
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 12
Siemens Simatic Net Cp 443-1 Opc Ua Firmware
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
7.5
CVSSv3
CVE-2016-4954
The process_packet function in ntp_proto.c in ntpd in NTP 4.x prior to 4.2.8p8 allows remote malicious users to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an ...
Ntp Ntp 4.2.8
Ntp Ntp
Oracle Solaris 11.3
Oracle Solaris 10
Suse Linux Enterprise Server 11
Suse Openstack Cloud 5
Suse Manager Proxy 2.1
Suse Manager 2.1
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Siemens Simatic Net Cp 443-1 Opc Ua Firmware
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
5.9
CVSSv3
CVE-2016-4955
ntpd in NTP 4.x prior to 4.2.8p8, when autokey is enabled, allows remote malicious users to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
Ntp Ntp 4.2.8
Ntp Ntp
Oracle Solaris 11.3
Oracle Solaris 10
Novell Suse Manager 2.1
Suse Linux Enterprise Server 11
Suse Openstack Cloud 5
Suse Manager Proxy 2.1
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Siemens Simatic Net Cp 443-1 Opc Ua Firmware
5.3
CVSSv3
CVE-2016-4956
ntpd in NTP 4.x prior to 4.2.8p8 allows remote malicious users to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
Ntp Ntp 4.2.8
Ntp Ntp
Oracle Solaris 11.3
Oracle Solaris 10
Novell Suse Manager 2.1
Suse Linux Enterprise Server 11
Suse Openstack Cloud 5
Suse Manager Proxy 2.1
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Siemens Simatic Net Cp 443-1 Opc Ua Firmware
7.5
CVSSv3
CVE-2016-5244
The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel up to and including 4.6.3 does not initialize a certain structure member, which allows remote malicious users to obtain sensitive information from kernel stack memory by reading an RDS message.
Fedoraproject Fedora 23
Suse Linux Enterprise Real Time Extension 11
Fedoraproject Fedora 24
Suse Linux Enterprise Debuginfo 11
Suse Linux Enterprise Real Time Extension 12
Suse Linux Enterprise Server 11
Redhat Enterprise Linux 6.0
Suse Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Workstation Extension 12
Redhat Enterprise Linux 5
Suse Linux Enterprise Desktop 12
Suse Opensuse Leap 42.1
Suse Suse Linux Enterprise Software Development Kit 12
Fedoraproject Fedora 22
Linux Linux Kernel
Suse Suse Linux Enterprise Server 12
9.8
CVSSv3
CVE-2016-0718
Expat allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
Mozilla Firefox
Apple Mac Os X
Suse Linux Enterprise Server 11
Suse Studio Onsite 1.3
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Debuginfo 11
Opensuse Leap 42.1
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Libexpat Project Libexpat
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mcafee Policy Auditor
Python Python
1 Article
7.5
CVSSv3
CVE-2016-4485
The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel prior to 4.5.5 does not initialize a certain data structure, which allows malicious users to obtain sensitive information from kernel stack memory by reading a message.
Novell Suse Linux Enterprise Server 11
Novell Suse Linux Enterprise Debuginfo 11
Novell Suse Linux Enterprise Software Development Kit 11.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Linux Linux Kernel
4.6
CVSSv3
CVE-2016-2187
The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel up to and including 4.5.2 allows physically proximate malicious users to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Linux Linux Kernel
Novell Suse Linux Enterprise Server 11
Novell Suse Linux Enterprise Debuginfo 11
Novell Suse Linux Enterprise Software Development Kit 11.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »