Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 22 vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2016-2312
Turning all screens off in Plasma-workspace and kscreenlocker while the lock screen is shown can result in the screen being unlocked when turning a screen on again.
Kde Kscreenlocker
Kde Plasma-workspace
Fedoraproject Fedora 22
Opensuse Leap 42.1
Fedoraproject Fedora 23
447
VMScore
CVE-2016-3125
The mod_tls module in ProFTPD prior to 1.3.5b and 1.3.6 prior to 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow malicious users to have unspecified impact via unkno...
Proftpd Proftpd 1.3.6
Proftpd Proftpd
Opensuse Opensuse 13.1
Fedoraproject Fedora 22
Fedoraproject Fedora 23
668
VMScore
CVE-2015-2059
The stringprep_utf8_to_ucs4 function in libin prior to 1.31, as used in jabberd2, allows context-dependent malicious users to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
Gnu Libidn
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Fedoraproject Fedora 21
Fedoraproject Fedora 22
320
VMScore
CVE-2014-4978
The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph.
Rawstudio Rawstudio 2.0-1.1
Fedoraproject Fedora 22
356
VMScore
CVE-2015-5069
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth prior to 1.12.3 and 1.13.x prior to 1.13.1 allow remote malicious users to obtain sensitive information via vectors related to inclusion of...
Wesnoth Battle For Wesnoth
Wesnoth Battle For Wesnoth 1.13.0
Fedoraproject Fedora 21
Fedoraproject Fedora 22
312
VMScore
CVE-2015-5070
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth prior to 1.12.4 and 1.13.x prior to 1.13.1, when a case-insensitive filesystem is used, allow remote malicious users to obtain sensitive in...
Wesnoth Battle For Wesnoth
Wesnoth Battle For Wesnoth 1.13.0
Fedoraproject Fedora 21
Fedoraproject Fedora 22
383
VMScore
CVE-2016-2228
Cross-site scripting (XSS) vulnerability in horde/templates/topbar/_menubar.html.php in Horde Groupware prior to 5.2.12 and Horde Groupware Webmail Edition prior to 5.2.12 allows remote malicious users to inject arbitrary web script or HTML via the searchfield parameter, as demon...
Debian Debian Linux 8.0
Horde Groupware
Horde Horde Groupware
Fedoraproject Fedora 22
Fedoraproject Fedora 23
409
VMScore
CVE-2015-4625
Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) prior to 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.
Fedoraproject Fedora 21
Opensuse Opensuse 13.2
Fedoraproject Fedora 22
Opensuse Opensuse 13.1
Polkit Project Polkit
516
VMScore
CVE-2015-1038
p7zip 9.20.1 allows remote malicious users to write to arbitrary files via a symlink attack in an archive.
Fedoraproject Fedora 22
Fedoraproject Fedora 23
Oracle Solaris 10.0
Oracle Solaris 11.2
7-zip P7zip 9.20.1
151
VMScore
CVE-2016-3158
The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception a...
Xen Xen
Fedoraproject Fedora 23
Fedoraproject Fedora 22
Oracle Vm Server 3.4
Oracle Vm Server 3.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »