Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse opensuse 13.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-2576
plugins/rssyl/feed.c in Claws Mail prior to 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote malicious users to spoof servers and conduct man-in-the-middle (MITM) attacks.
Claws-mail Claws-mail
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
NA
CVE-2015-7805
Heap-based buffer overflow in libsndfile 1.0.25 allows remote malicious users to have unspecified impact via the headindex value in the header in an AIFF file.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mega-nerd Libsndfile 1.0.25
1 EDB exploit
NA
CVE-2014-9640
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote malicious users to cause a denial of service (out-of-bounds read) via a crafted raw file.
Xiph Vorbis-tools 1.4.0
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
NA
CVE-2015-2141
The InvertibleRWFunction::CalculateInverse function in rw.cpp in libcrypt++ 5.6.2 does not properly blind private key operations for the Rabin-Williams digital signature algorithm, which allows remote malicious users to obtain private keys via a timing attack.
Cryptopp Crypto\\+\\+ Library 5.6.2
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
NA
CVE-2014-8640
The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox prior to 35.0 and SeaMonkey prior to 2.32 does not properly restrict timeline operations, which allows remote malicious users to cause a denial of service (un...
Mozilla Firefox
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Mozilla Seamonkey
NA
CVE-2014-8642
Mozilla Firefox prior to 35.0 and SeaMonkey prior to 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote malicious users to obtain sensitive information by sniffing the network during a session i...
Mozilla Seamonkey
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mozilla Firefox
NA
CVE-2014-8148
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Midgard-project Midgard2 10.05.7.1
NA
CVE-2015-5309
Integer overflow in the terminal emulator in PuTTY prior to 0.66 allows remote malicious users to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer u...
Opensuse Leap 42.1
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Simon Tatham Putty
6.5
CVSSv3
CVE-2016-5316
Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and previous versions allows remote malicious users to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.
Libtiff Libtiff
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Opensuse Project Leap 42.1
9.8
CVSSv3
CVE-2016-1944
The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox prior to 44.0, might allow remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Mozilla Firefox 43.0.4
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »