This might be proprietary software.
|2013-11-23||CVE-2013-4547||nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.||Nginx, Opensuse, Lifecycle_management_server, Studio_onsite, Webyast||N/A|
|2011-12-08||CVE-2011-4315||Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.||Fedora, Nginx, Studio, Studio_onsite, Webyast||N/A|
|2013-12-23||CVE-2013-3709||WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.||Suse_lifecycle_management_server, Studio_onsite, Webyast||N/A|
|2013-01-26||CVE-2012-0435||SUSE WebYaST before 1.2 0.2.63-0.6.1 allows remote attackers to modify the hosts list, and subsequently conduct man-in-the-middle attacks, via a crafted /host request on TCP port 4984.||Webyast||N/A|