Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
point-to-point protocol project point-to-point protocol vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2014-3158
Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) prior to 2.4.7 allows malicious users to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] secu...
Point-to-point Protocol Project Point-to-point Protocol
7.2
CVSSv2
CVE-2006-2194
The winbind plugin in pppd for ppp 2.4.4 and previous versions does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which pr...
Point-to-point Protocol Project Point-to-point Protocol
7.5
CVSSv2
CVE-2018-11574
Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls...
Point-to-point Protocol Project Point-to-point Protocol
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
4.3
CVSSv2
CVE-2015-3310
Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and previous versions, when the PID for pppd is greater than 65535, allows remote malicious users to cause a denial of service (crash) via a start accounting message to the RA...
Canonical Ubuntu Linux 12.04
Debian Debian Linux 7.0
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Point-to-point Protocol Project Point-to-point Protocol
7.5
CVSSv2
CVE-2020-8597
eap.c in pppd in ppp 2.4.2 up to and including 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
Point-to-point Protocol Project Point-to-point Protocol
Wago Pfc Firmware
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
6 Github repositories
7.5
CVSSv2
CVE-2004-2695
SQL injection vulnerability in the Authorize.net callback code (subscriptions/authorize.php) in Jelsoft vBulletin 3.0 up to and including 3.0.3 allows remote malicious users to execute arbitrary SQL statements via the x_invoice_num parameter. NOTE: this issue might be related to ...
Jelsoft Vbulletin 3.0 Beta 6
Jelsoft Vbulletin 3.0.1
Jelsoft Vbulletin 3.0 Beta 7
Jelsoft Vbulletin 3.0 Beta 3
Jelsoft Vbulletin 3.0 Beta 2
Jelsoft Vbulletin 3.0.2
Jelsoft Vbulletin 3.0 Gamma
Jelsoft Vbulletin 3.0 Beta 4
Jelsoft Vbulletin 3.0.3
Jelsoft Vbulletin 3.0
Jelsoft Vbulletin 3.0 Beta 5
Point-to-point Protocol Project Point-to-point Protocol 2.4.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started