Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle solaris 11.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-8768
Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 up to and including 4.6.2, when in verbose mode, allow remote malicious users to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Oracle Solaris 11.2
Redhat Tcpdump 4.6.2
Redhat Tcpdump 4.6.0
Redhat Tcpdump 4.6.1
Redhat Tcpdump 4.5.1
Redhat Tcpdump 4.5.2
Redhat Tcpdump 4.5.0
1 EDB exploit
NA
CVE-2015-3812
Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x prior to 1.10.14 and 1.12.x prior to 1.12.5 allow remote malicious users to cause a denial of service (memory consumption) via a crafted packet.
Oracle Solaris 11.2
Oracle Linux 7
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.10.8
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.10.6
Wireshark Wireshark 1.10.9
Wireshark Wireshark 1.10.13
Wireshark Wireshark 1.10.12
Wireshark Wireshark 1.10.10
Wireshark Wireshark 1.10.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.10.3
Wireshark Wireshark 1.10.2
Wireshark Wireshark 1.10.1
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.10.7
Wireshark Wireshark 1.10.4
Wireshark Wireshark 1.12.3
Wireshark Wireshark 1.10.5
Wireshark Wireshark 1.10.11
NA
CVE-2015-0561
asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x prior to 1.10.12 and 1.12.x prior to 1.12.3 does not validate a certain index value, which allows remote malicious users to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet...
Wireshark Wireshark 1.10.8
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.10.6
Wireshark Wireshark 1.10.9
Wireshark Wireshark 1.10.10
Wireshark Wireshark 1.10.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.10.3
Wireshark Wireshark 1.10.2
Wireshark Wireshark 1.10.1
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.10.7
Wireshark Wireshark 1.10.4
Wireshark Wireshark 1.10.5
Wireshark Wireshark 1.10.11
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Oracle Solaris 11.2
NA
CVE-2015-0973
Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng prior to 1.5.21 and 1.6.x prior to 1.6.16 allows context-dependent malicious users to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
Oracle Solaris 11.2
Libpng Libpng 1.6.0
Libpng Libpng 1.6.1
Libpng Libpng 1.6.2
Libpng Libpng 1.6.10
Libpng Libpng 1.6.11
Libpng Libpng 1.6.4
Libpng Libpng 1.6.5
Libpng Libpng 1.6.6
Libpng Libpng 1.6.7
Libpng Libpng 1.6.14
Libpng Libpng 1.6.15
Libpng Libpng 1.6.3
Libpng Libpng 1.6.8
Libpng Libpng 1.6.9
Libpng Libpng 1.6.13
Libpng Libpng
Libpng Libpng 1.6.12
Apple Mac Os X
NA
CVE-2014-9671
Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType prior to 2.5.4 allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incre...
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Hpc Node 6
Redhat Enterprise Linux Desktop 6.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Oracle Solaris 10.0
Oracle Solaris 11.2
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Freetype Freetype
NA
CVE-2014-9674
The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType prior to 2.5.4 proceeds with adding to length values without validating the original values, which allows remote malicious users to cause a denial of service (integer overflow and heap-based buffer overflow) or poss...
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Oracle Solaris 10.0
Oracle Solaris 11.2
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Desktop 6.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
NA
CVE-2011-4091
The libobby server in inc/server.hpp in libnet6 (aka net6) prior to 1.3.14 does not perform authentication before checking the user name, which allows remote malicious users to obtain sensitive information such as server-usage patterns by a particular user and color preferences.
Opensuse Opensuse 11.4
Opensuse Opensuse 11.3
Oracle Solaris 11.2
Armin Burgmeier Net6
Armin Burgmeier Net6 1.3.5
Armin Burgmeier Net6 1.3.9
Armin Burgmeier Net6 1.3.7
Armin Burgmeier Net6 1.3.1
Armin Burgmeier Net6 1.3.12
Armin Burgmeier Net6 1.3.6
Armin Burgmeier Net6 1.3.4
Armin Burgmeier Net6 1.3.2
Armin Burgmeier Net6 1.3.11
Armin Burgmeier Net6 1.3.10
Armin Burgmeier Net6 1.3.3
Armin Burgmeier Net6 1.3.8
NA
CVE-2011-4093
Integer overflow in inc/server.hpp in libnet6 (aka net6) prior to 1.3.14 might allow remote malicious users to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.
Oracle Solaris 11.2
Armin Burgmeier Net6
Armin Burgmeier Net6 1.3.5
Armin Burgmeier Net6 1.3.9
Armin Burgmeier Net6 1.3.7
Armin Burgmeier Net6 1.3.1
Armin Burgmeier Net6 1.3.12
Armin Burgmeier Net6 1.3.6
Armin Burgmeier Net6 1.3.4
Armin Burgmeier Net6 1.3.2
Armin Burgmeier Net6 1.3.11
Armin Burgmeier Net6 1.3.10
Armin Burgmeier Net6 1.3.3
Armin Burgmeier Net6 1.3.8
Opensuse Project Opensuse 11.4
Opensuse Opensuse 11.3
NA
CVE-2015-3814
The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x prior to 1.10.14 and 1.12.x prior to 1.12.5 interpret a zero value as a length rather than an error condition, which allows re...
Oracle Solaris 11.2
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.10.8
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.10.6
Wireshark Wireshark 1.10.9
Wireshark Wireshark 1.10.13
Wireshark Wireshark 1.10.12
Wireshark Wireshark 1.10.10
Wireshark Wireshark 1.10.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.10.3
Wireshark Wireshark 1.10.2
Wireshark Wireshark 1.10.1
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.10.7
Wireshark Wireshark 1.10.4
Wireshark Wireshark 1.10.14
Wireshark Wireshark 1.12.3
Wireshark Wireshark 1.10.5
Wireshark Wireshark 1.10.11
NA
CVE-2014-9657
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType prior to 2.5.4 does not establish a minimum record size, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Desktop 7.0
Oracle Solaris 10.0
Oracle Solaris 11.2
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Freetype Freetype
Debian Debian Linux 7.0
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »