Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse openstack cloud 5 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2016-4957
ntpd in NTP prior to 4.2.8p8 allows remote malicious users to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
Ntp Ntp 4.2.8
Ntp Ntp 4.3.92
Oracle Solaris 10
Oracle Solaris 11.3
Suse Manager Proxy 2.1
Suse Openstack Cloud 5
Novell Suse Manager 2.1
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 12
890
VMScore
CVE-2016-2315
revision.c in git prior to 2.7.4 uses an incorrect integer data type, which allows remote malicious users to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.
Suse Openstack Cloud 5
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Server 12
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Debuginfo 11
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Suse Suse Linux Enterprise Server 12
Git-scm Git 2.7.3
1 Article
383
VMScore
CVE-2016-4955
ntpd in NTP 4.x prior to 4.2.8p8, when autokey is enabled, allows remote malicious users to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
Ntp Ntp 4.2.8
Ntp Ntp
Oracle Solaris 11.3
Oracle Solaris 10
Novell Suse Manager 2.1
Suse Linux Enterprise Server 11
Suse Openstack Cloud 5
Suse Manager Proxy 2.1
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Siemens Simatic Net Cp 443-1 Opc Ua Firmware
445
VMScore
CVE-2016-4956
ntpd in NTP 4.x prior to 4.2.8p8 allows remote malicious users to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
Ntp Ntp 4.2.8
Ntp Ntp
Oracle Solaris 11.3
Oracle Solaris 10
Novell Suse Manager 2.1
Suse Linux Enterprise Server 11
Suse Openstack Cloud 5
Suse Manager Proxy 2.1
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Siemens Simatic Net Cp 443-1 Opc Ua Firmware
890
VMScore
CVE-2016-2324
Integer overflow in Git prior to 2.7.4 allows remote malicious users to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
Suse Openstack Cloud 5
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Software Development Kit 12.0
Suse Linux Enterprise Server 12.0
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Debuginfo 11
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Suse Suse Linux Enterprise Server 12
Git-scm Git
1 Article
445
VMScore
CVE-2016-4954
The process_packet function in ntp_proto.c in ntpd in NTP 4.x prior to 4.2.8p8 allows remote malicious users to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an ...
Ntp Ntp 4.2.8
Ntp Ntp
Oracle Solaris 11.3
Oracle Solaris 10
Suse Linux Enterprise Server 11
Suse Openstack Cloud 5
Suse Manager Proxy 2.1
Suse Manager 2.1
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Siemens Simatic Net Cp 443-1 Opc Ua Firmware
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
445
VMScore
CVE-2016-4953
ntpd in NTP 4.x prior to 4.2.8p8 allows remote malicious users to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
Ntp Ntp
Ntp Ntp 4.2.8
Oracle Solaris 10
Oracle Solaris 11.3
Suse Manager 2.1
Suse Manager Proxy 2.1
Suse Openstack Cloud 5
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 12
Siemens Simatic Net Cp 443-1 Opc Ua Firmware
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
641
VMScore
CVE-2020-8022
A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux ...
Apache Tomcat
Opensuse Leap 15.1
642
VMScore
CVE-2020-8023
A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterpri...
Opensuse Openldap2
695
VMScore
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer...
Apple Swiftnio
Apache Traffic Server
Debian Debian Linux 10.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Debian Debian Linux 9.0
Synology Skynas -
Synology Diskstation Manager 6.2
Synology Vs960hd Firmware -
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.0
Opensuse Leap 15.1
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Software Collections 1.0
Redhat Openshift Container Platform 3.9
Redhat Openshift Container Platform 3.11
Redhat Openshift Container Platform 3.10
Redhat Jboss Core Services 1.0
Redhat Enterprise Linux 8.0
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »