Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian adequate vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2005-4890
There is a possible tty hijacking in shadow 4.x prior to 4.1.5 and sudo 1.x prior to 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next proces...
Debian Shadow
Sudo Project Sudo
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Enterprise Linux 5
Redhat Enterprise Linux 4
Redhat Enterprise Linux 6.0
2 Github repositories
NA
CVE-2013-6409
Debian adequate prior to 0.8.1, when run by root with the --user option, allows local users to hijack the tty and possibly gain privileges via the TIOCSTI ioctl.
Debian Adequate
Debian Adequate 0.7.1
Debian Adequate 0.7
Debian Adequate 0.2
Debian Adequate 0.1.1
Debian Adequate 0.1
Debian Adequate 0.5
Debian Adequate 0.4.4
Debian Adequate 0.4.3
Debian Adequate 0.4.2
Debian Adequate 0.6
Debian Adequate 0.5.2
Debian Adequate 0.4
Debian Adequate 0.2.1
Debian Adequate 0.5.3
Debian Adequate 0.5.1
Debian Adequate 0.4.1
Debian Adequate 0.3.1
NA
CVE-2013-4365
Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module prior to 2.3.9 for the Apache HTTP Server allows remote malicious users to have an unspecified impact via unknown vectors.
Apache Mod Fcgid
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Opensuse Opensuse 12.3
Suse Linux Enterprise Software Development Kit 11
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
Suse Cloud 2.0
Suse Cloud 1.0
NA
CVE-2008-3529
Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 prior to 2.7.0 allows context-dependent malicious users to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.
Xmlsoft Libxml2
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
Apple Mac Os X 10.5.7
Apple Mac Os X
Apple Safari
Apple Iphone Os
1 EDB exploit
NA
CVE-2007-0009
Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) prior to 3.11.5, as used by Firefox prior to 1.5.0.10 and 2.x prior to 2.0.0.2, Thunderbird prior to 1.5.0.10, SeaMonkey prior to 1.0.8, and certain Sun Java System server products prior t...
Mozilla Firefox
Mozilla Network Security Services
Mozilla Seamonkey
Mozilla Thunderbird
Debian Debian Linux 4.0
Debian Debian Linux 3.1
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started