Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse opensuse 12.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-1500
Mozilla Firefox prior to 28.0 and SeaMonkey prior to 2.25 allow remote malicious users to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.
Opensuse Project Opensuse 11.4
Opensuse Opensuse 13.1
Opensuse Project Opensuse 12.3
Oracle Solaris 11.3
Mozilla Firefox
Mozilla Seamonkey
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 11
NA
CVE-2014-1502
The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox prior to 28.0 and SeaMonkey prior to 2.25 allow remote malicious users to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.
Opensuse Project Opensuse 12.3
Opensuse Opensuse 13.1
Opensuse Project Opensuse 11.4
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Server 11
Suse Linux Enterprise Desktop 11
Oracle Solaris 11.3
Mozilla Firefox
Mozilla Seamonkey
NA
CVE-2014-1504
The session-restore feature in Mozilla Firefox prior to 28.0 and SeaMonkey prior to 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote malicious users to conduct cross-site scripting (XSS) attacks via a crafted document that is acc...
Mozilla Firefox
Mozilla Seamonkey
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Oracle Solaris 11.3
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Sdk 11
Suse Linux Enterprise Server 11
8.8
CVSSv3
CVE-2014-1497
The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 allows remote malicious users to obtain sensitive information from process heap memory, cause a denial of ser...
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Seamonkey
Mozilla Thunderbird
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Suse Suse Linux Enterprise Software Development Kit 11.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Suse Suse Linux Enterprise Desktop 11
Suse Suse Linux Enterprise Server 11
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.10
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Eus 6.5
7.5
CVSSv3
CVE-2014-1505
The SVG filter implementation in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 allows remote malicious users to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Polic...
Mozilla Seamonkey
Mozilla Firefox Esr
Mozilla Firefox
Mozilla Thunderbird
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Eus 6.5
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.5
Opensuse Opensuse 12.3
Opensuse Opensuse 11.4
Suse Suse Linux Enterprise Server 11
9.1
CVSSv3
CVE-2014-1508
The libxul.so!gfxContext::Polygon function in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 allows remote malicious users to obtain sensitive information from process memory, cause a denial of service (out-of...
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Seamonkey
Mozilla Thunderbird
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Eus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.10
Suse Suse Linux Enterprise Software Development Kit 11.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
NA
CVE-2014-1512
Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 allows remote malicious users to execute arbitrary code by triggering extensive m...
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Seamonkey
Mozilla Thunderbird
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.10
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Eus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Workstation 6.0
Suse Suse Linux Enterprise Software Development Kit 11.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
8.8
CVSSv3
CVE-2014-1513
TypedArrayObject.cpp in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote malicious users to execute arbitrary co...
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Seamonkey
Mozilla Thunderbird
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Suse Suse Linux Enterprise Software Development Kit 11.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Suse Suse Linux Enterprise Desktop 11
Suse Suse Linux Enterprise Server 11
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Eus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Workstation 6.0
9.8
CVSSv3
CVE-2014-1514
vmtypedarrayobject.cpp in Mozilla Firefox prior to 28.0, Firefox ESR 24.x prior to 24.4, Thunderbird prior to 24.4, and SeaMonkey prior to 2.25 does not validate the length of the destination array before a copy operation, which allows remote malicious users to execute arbitrary ...
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Seamonkey
Mozilla Thunderbird
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Suse Suse Linux Enterprise Software Development Kit 11.0
Opensuse Opensuse 11.4
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Suse Suse Linux Enterprise Desktop 11
Suse Suse Linux Enterprise Server 11
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Eus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Workstation 6.0
NA
CVE-2014-1705
Google V8, as used in Google Chrome prior to 33.0.1750.152 on OS X and Linux and prior to 33.0.1750.154 on Windows, allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Google Chrome
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Debian Debian Linux 8.0
Debian Debian Linux 7.0
2 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »