Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse suse linux 5.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-31252
A Incorrect Authorization vulnerability in chkstat of SUSE Linux Enterprise Server 12-SP5; openSUSE Leap 15.3, openSUSE Leap 15.4, openSUSE Leap Micro 5.2 did not consider group writable path components, allowing local attackers with access to a group what can write to a location...
Suse Linux Enterprise Server 12
Opensuse Leap 15.3
Opensuse Leap Micro 5.2
Opensuse Leap 15.4
7.2
CVSSv2
CVE-2022-27239
In cifs-utils up to and including 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Samba Cifs-utils
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Suse Linux Enterprise Server 11
Suse Openstack Cloud 8.0
Suse Linux Enterprise Server 15
Suse Linux Enterprise Software Development Kit 12
Suse Openstack Cloud Crowbar 8.0
Suse Openstack Cloud Crowbar 9.0
Suse Openstack Cloud 9.0
Suse Linux Enterprise Server 12
Suse Manager Server 4.1
Suse Linux Enterprise Desktop 15
Suse Enterprise Storage 7.0
Suse Caas Platform 4.0
Suse Enterprise Storage 6.0
Suse Manager Proxy 4.1
Suse Linux Enterprise High Performance Computing 12.0
Suse Linux Enterprise High Performance Computing 15.0
Suse Linux Enterprise Real Time 15.0
Suse Linux Enterprise Point Of Service 11.0
7.5
CVSSv2
CVE-2017-14491
Heap-based buffer overflow in dnsmasq prior to 2.78 allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
Thekelleys Dnsmasq
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 7.1
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Suse Linux Enterprise Server 11
Suse Linux Enterprise Debuginfo 11
Suse Linux Enterprise Server 12
Suse Linux Enterprise Point Of Sale 11
Nvidia Linux For Tegra
1 EDB exploit
9 Github repositories
7.5
CVSSv2
CVE-2013-4480
Red Hat Satellite 5.6 and previous versions does not disable the web interface that is used to create the first user for a satellite, which allows remote malicious users to create administrator accounts.
Redhat Network Satellite
Redhat Satellite With Embedded Oracle 5.4
Redhat Satellite With Embedded Oracle 5.3
Redhat Satellite With Embedded Oracle 5.5
Redhat Satellite
Redhat Satellite With Embedded Oracle 5.2
Suse Manager 1.7
Suse Linux Enterprise 11.0
5
CVSSv2
CVE-2013-1861
MariaDB 5.5.x prior to 5.5.30, 5.3.x prior to 5.3.13, 5.2.x prior to 5.2.15, and 5.1.x prior to 5.1.68, and Oracle MySQL 5.1.69 and previous versions, 5.5.31 and previous versions, and 5.6.11 and previous versions allows remote malicious users to cause a denial of service (crash)...
Mariadb Mariadb
Oracle Mysql
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 5
Debian Debian Linux 7.0
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 11
Opensuse Opensuse 12.3
Suse Linux Enterprise Software Development Kit 11
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
1 EDB exploit
2 Github repositories
2.1
CVSSv2
CVE-2010-2942
The actions implementation in the network queueing functionality in the Linux kernel prior to 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory...
Linux Linux Kernel 2.6.36
Linux Linux Kernel
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Opensuse Opensuse 11.1
Opensuse Opensuse 11.3
Suse Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Desktop 11
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Desktop 10
Avaya Aura System Manager 6.0
Avaya Aura System Manager 5.2
Avaya Aura Communication Manager 5.2
Avaya Voice Portal 5.1
Avaya Voice Portal 5.0
Avaya Aura System Platform 1.1
Avaya Aura System Platform 6.0
Avaya Aura System Manager 6.1
7.2
CVSSv2
CVE-2010-2798
The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel prior to 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibl...
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 5.0
Avaya Aura System Manager 6.0
Avaya Aura System Manager 5.2
Avaya Aura Communication Manager 5.2
Avaya Voice Portal 5.1
Avaya Voice Portal 5.0
Avaya Aura System Platform 1.1
Avaya Aura System Platform 6.0
Avaya Aura System Manager 6.1
Avaya Aura System Manager 6.1.1
Avaya Aura Session Manager 1.1
Avaya Aura Session Manager 5.2
Avaya Aura Session Manager 6.0
6.6
CVSSv2
CVE-2009-3939
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and previous versions has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Virtualization 5
Redhat Enterprise Linux Eus 5.4
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 5.0
Avaya Aura System Manager 6.0
Avaya Aura System Manager 5.2
Avaya Aura Communication Manager 5.2
Avaya Voice Portal 5.0
Avaya Aura System Platform 1.1
Avaya Aura Session Manager 1.1
Avaya Aura Session Manager 5.2
Avaya Aura Sip Enablement Services 5.2
Avaya Aura Application Enablement Services 5.2
Avaya Aura Application Enablement Services 5.2.1
2.1
CVSSv2
CVE-2008-1945
QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-20...
Qemu Qemu 0.9.0
Opensuse Opensuse 10.3
Opensuse Opensuse 11.0
Opensuse Opensuse 11.1
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Debian Debian Linux 4.0
Debian Debian Linux 5.0
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.2
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
7.5
CVSSv2
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.0.4 8
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.17
Easy Software Products Cups 1.1.18
Easy Software Products Cups 1.1.4 5
Easy Software Products Cups 1.1.6
Kde Koffice 1.3.3
Kde Koffice 1.3 Beta1
Pdftohtml Pdftohtml 0.33a
Pdftohtml Pdftohtml 0.34
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
Xpdf Xpdf 2.0
Xpdf Xpdf 2.1
Ascii Ptex 3.1.4
Cstex Cstetex 2.0.2
Easy Software Products Cups 1.1.15
Easy Software Products Cups 1.1.16
Easy Software Products Cups 1.1.4 2
Easy Software Products Cups 1.1.4 3
Kde Koffice 1.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »