Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fail2ban fail2ban 0.8.3 vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2009-0362
filter.d/wuftpd.conf in Fail2ban 0.8.3 uses an incorrect regular expression that allows remote malicious users to cause a denial of service (forced authentication failures) via a crafted reverse-resolved DNS name (rhost) entry that contains a substring that is interpreted as an I...
Fail2ban Fail2ban 0.8.3
4.7
CVSSv2
CVE-2009-5023
The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban prior to 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/...
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.7.6
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban 0.3.0
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.1.1
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.3
Fail2ban Fail2ban 0.7.0
Fail2ban Fail2ban 0.6.1
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.5.5
Fail2ban Fail2ban 0.8.2
7.5
CVSSv2
CVE-2012-5642
server/action.py in Fail2ban prior to 0.8.8 does not properly handle the content of the matches tag, which might allow remote malicious users to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.8.3
Fail2ban Fail2ban 0.7.6
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.5.5
Fail2ban Fail2ban 0.5.4
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.8.5
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.6.1
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.8.0
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.7.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.5.0
5
CVSSv2
CVE-2013-7176
config/filter.d/postfix.conf in the postfix filter in Fail2ban prior to 0.8.11 allows remote malicious users to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Fail2ban Fail2ban 0.8.3
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.5.5
Fail2ban Fail2ban 0.5.4
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.3.0
Fail2ban Fail2ban 0.1.2
Fail2ban Fail2ban 0.8.5
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.7.6
Fail2ban Fail2ban 0.6.1
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.7.1
5
CVSSv2
CVE-2013-7177
config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban prior to 0.8.11 allows remote malicious users to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Fail2ban Fail2ban 0.8.7.1
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.7.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.5.0
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.9
Fail2ban Fail2ban 0.8.8
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.8.0
Fail2ban Fail2ban 0.7.3
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban 0.1.1
Fail2ban Fail2ban 0.1.0
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.8.3
5
CVSSv2
CVE-2013-2178
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban prior to 0.8.10 do not properly validate log messages, which allows remote malicious users to block arbitrary IP addresses via certain messages in a request.
Fail2ban Fail2ban 0.8.5
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.7.6
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.5.5
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.7.1
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.8.0
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.1.1
Fail2ban Fail2ban 0.1.0
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.7.9
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started