Home
Bugtraq
Full List
Only Bugs
Only Tricks
Only Exploits
Only Dorks
Only CVE
Only CWE
Fake Notes
Ranking
CVEMAP
Full List
Show Vendors
Show Products
CWE Dictionary
Check CVE Id
Check CWE Id
Search
Bugtraq
CVEMAP
By author
CVE Id
CWE Id
By vendors
By products
RSS
Bugtraq
CVEMAP
CVE Products
Bugs
Exploits
Dorks
More
cIFrex
Facebook
Twitter
Donate
About
Submit
Vulnerabilities for
'Manager proxy'
2017-07-21
CVE-2015-5300
CWE-361
The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
CVE-2015-5219
CWE-704
The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
CVE-2015-5194
CWE-20
The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands.
2017-05-03
CVE-2017-7995
Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
2017-01-30
CVE-2015-7976
CWE-254
The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
2016-05-24
CVE-2016-0264
CWE-119
Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) allows remote attackers to execute arbitrary code via unspecified vectors.
>>>
Vendor:
SUSE
76
Products
Suse linux
Suse linux imap server
Suse linux openexchange server
Office server
Suse email server
Suse linux admin-cd for firewall
Suse linux connectivity server
Suse linux database server
Suse linux firewall cd
Suse linux office server
Suse office server
Suse linux firewall
Suse linux firewall live-cd
Suse iptables
Suse cvsup
Suse linux school server
Suse linux standard server
Suse sled beagle
Suse open enterprise server
Linux enterprise desktop
Opensuse
Open suse
Yast2-backup
Shadow
Suse linux enterprise server
KIWI
VPNC
Webyast
Openstack
Suse linux enterprise desktop
Studio onsite
Studio extension for system z
Suse linux enterprise software development kit
GCAB
Opensuse osc
Linux enterprise server
Linux enterprise debuginfo
Manager
Linux enterprise software development kit
Linux enterprise workstation extension
Openstack cloud
Yast2
Manager proxy
Suse openstack cloud
Linux enterprise
Suse linux enterprise live patching
Suse linux enterprise module for public cloud
Suse linux enterprise workstation extension
Suse linux enterprise real time extension
Linux enterprise real time extension
Opensuse leap
Suse linux workstation extension
Linux enterprise server for sap
Linux enterprise server for raspberry pi
Linux enterprise high availability
Rancher
Linux enterprise module for web scripting
Linux enterprise for sap
Portus
Linux enterprise point of sale
Susefirewall2
Open build service
Linux enterprise module for public cloud
Subscription management tool
Suse enterprise storage
Backports
Package hub
Caas platform
Repository mirroring tool
Openqa
Susestudio-ui-server
Yast2-security
Keystone json assignment
Openstack cloud crowbar
Linux enterprise high performance computing
Manager server
Copyright
2024
, cxsecurity.com
Back to Top