Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fail2ban fail2ban 0.8.3 vulnerabilities and exploits
(subscribe to this query)
356
VMScore
CVE-2009-0362
filter.d/wuftpd.conf in Fail2ban 0.8.3 uses an incorrect regular expression that allows remote malicious users to cause a denial of service (forced authentication failures) via a crafted reverse-resolved DNS name (rhost) entry that contains a substring that is interpreted as an I...
Fail2ban Fail2ban 0.8.3
418
VMScore
CVE-2009-5023
The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban prior to 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/...
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.7.6
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban 0.3.0
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.1.1
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.3
Fail2ban Fail2ban 0.7.0
Fail2ban Fail2ban 0.6.1
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.5.5
Fail2ban Fail2ban 0.8.2
668
VMScore
CVE-2012-5642
server/action.py in Fail2ban prior to 0.8.8 does not properly handle the content of the matches tag, which might allow remote malicious users to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.8.3
Fail2ban Fail2ban 0.7.6
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.5.5
Fail2ban Fail2ban 0.5.4
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.8.5
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.6.1
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.8.0
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.7.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.5.0
445
VMScore
CVE-2013-7176
config/filter.d/postfix.conf in the postfix filter in Fail2ban prior to 0.8.11 allows remote malicious users to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Fail2ban Fail2ban 0.8.3
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.5.5
Fail2ban Fail2ban 0.5.4
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.3.0
Fail2ban Fail2ban 0.1.2
Fail2ban Fail2ban 0.8.5
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.7.6
Fail2ban Fail2ban 0.6.1
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.7.1
445
VMScore
CVE-2013-7177
config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban prior to 0.8.11 allows remote malicious users to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Fail2ban Fail2ban 0.8.7.1
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.7.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.5.0
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.9
Fail2ban Fail2ban 0.8.8
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.8.0
Fail2ban Fail2ban 0.7.3
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban 0.1.1
Fail2ban Fail2ban 0.1.0
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.8.3
445
VMScore
CVE-2013-2178
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban prior to 0.8.10 do not properly validate log messages, which allows remote malicious users to block arbitrary IP addresses via certain messages in a request.
Fail2ban Fail2ban 0.8.5
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.7.6
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.5.5
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.7.1
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.8.0
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.1.1
Fail2ban Fail2ban 0.1.0
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.7.9
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started