Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mageia mageia 4.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2014-9087
Integer underflow in the ksba_oid_to_str function in Libksba prior to 1.3.2, as used in GnuPG, allows remote malicious users to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
Mageia Mageia 3.0
Mageia Mageia 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Gnupg Libksba
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Gnupg Gnupg 2.1.0
7.5
CVSSv2
CVE-2013-4159
ctdb prior to 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, an...
Ctdb Project Ctdb 2.1
Opensuse Opensuse 12.3
Ctdb Project Ctdb
Ctdb Project Ctdb 2.0
Opensuse Opensuse 13.1
Mageia Mageia 3.0
Mageia Mageia 4.0
7.1
CVSSv2
CVE-2014-9637
GNU patch 2.7.2 and previous versions allows remote malicious users to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Mageia Mageia 4.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 12.04
Gnu Patch
6.8
CVSSv2
CVE-2015-2296
The resolve_redirects function in sessions.py in requests 2.1.0 up to and including 2.5.3 allows remote malicious users to conduct session fixation attacks via a cookie without a host value in a redirect.
Mageia Project Mageia 4.0
Python Requests 2.1.0
Python Requests 2.2.1
Python Requests 2.3.0
Python Requests 2.4.1
Python Requests 2.4.3
Python Requests 2.5.0
Python Requests 2.5.1
Python Requests 2.5.2
Python Requests 2.4.0
Python Requests 2.4.2
Python Requests 2.5.3
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
6.8
CVSSv2
CVE-2014-8104
OpenVPN 2.x prior to 2.0.11, 2.1.x, 2.2.x prior to 2.2.3, and 2.3.x prior to 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
Mageia Mageia 4.0
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Opensuse Opensuse 12.3
Openvpn Openvpn 2.0 Test1
Openvpn Openvpn 2.0 Test11
Openvpn Openvpn 2.0 Test19
Openvpn Openvpn 2.0 Test20
Openvpn Openvpn 2.0 Test27
Openvpn Openvpn 2.0 Test29
Openvpn Openvpn 2.0 Test7
Openvpn Openvpn 2.0 Test9
Openvpn Openvpn 2.0 Rc15
Openvpn Openvpn 2.0 Rc17
Openvpn Openvpn 2.0 Rc4
Openvpn Openvpn 2.0 Rc6
Openvpn Openvpn 2.0.1 Rc1
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0.1 Rc5
Openvpn Openvpn Access Server 2.0.3
1 Article
6.8
CVSSv2
CVE-2014-9037
WordPress prior to 3.7.5, 3.8.x prior to 3.8.5, 3.9.x prior to 3.9.3, and 4.x prior to 4.0.1 might allow remote malicious users to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
Mageia Project Mageia 4
Mageia Project Mageia 3
Wordpress Wordpress 3.8
Wordpress Wordpress 3.9
Wordpress Wordpress 3.9.2
Wordpress Wordpress 3.8.1
Wordpress Wordpress 3.8.2
Wordpress Wordpress 3.8.3
Wordpress Wordpress 3.8.4
Wordpress Wordpress
Wordpress Wordpress 3.9.1
Wordpress Wordpress 4.0
Debian Debian Linux 7.0
Debian Debian Linux 8.0
6.8
CVSSv2
CVE-2014-3429
IPython Notebook 0.12 up to and including 1.x prior to 1.2 does not validate the origin of websocket requests, which allows remote malicious users to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Ipython Ipython Notebook 1.1.0
Ipython Ipython Notebook 0.12
Ipython Ipython Notebook 0.12.1
Ipython Ipython Notebook 0.13
Ipython Ipython Notebook 0.13.1
Ipython Ipython Notebook 0.13.2
Ipython Ipython Notebook 1.0.0
Mageia Mageia 4.0
Mageia Mageia 3.0
5
CVSSv2
CVE-2014-9116
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote malicious users to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt...
Suse Linux Enterprise Desktop 12
Suse Suse Linux Enterprise Server 12
Mutt Mutt 1.5.23
Debian Debian Linux 7.0
Mageia Mageia 4.0
5
CVSSv2
CVE-2014-8763
DokuWiki prior to 2014-05-05b, when using Active Directory for LDAP authentication, allows remote malicious users to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.
Dokuwiki Dokuwiki
Mageia Project Mageia 4.0
Mageia Project Mageia 3.0
5
CVSSv2
CVE-2014-8764
DokuWiki 2014-05-05a and previous versions, when using Active Directory for LDAP authentication, allows remote malicious users to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind.
Mageia Project Mageia 4.0
Mageia Project Mageia 3.0
Dokuwiki Dokuwiki
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »