Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mageia project mageia 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-8763
DokuWiki prior to 2014-05-05b, when using Active Directory for LDAP authentication, allows remote malicious users to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.
Dokuwiki Dokuwiki
Mageia Project Mageia 4.0
Mageia Project Mageia 3.0
NA
CVE-2014-8764
DokuWiki 2014-05-05a and previous versions, when using Active Directory for LDAP authentication, allows remote malicious users to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind.
Mageia Project Mageia 4.0
Mageia Project Mageia 3.0
Dokuwiki Dokuwiki
NA
CVE-2013-4159
ctdb prior to 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, an...
Ctdb Project Ctdb 2.1
Opensuse Opensuse 12.3
Ctdb Project Ctdb
Ctdb Project Ctdb 2.0
Opensuse Opensuse 13.1
Mageia Mageia 3.0
Mageia Mageia 4.0
NA
CVE-2014-9037
WordPress prior to 3.7.5, 3.8.x prior to 3.8.5, 3.9.x prior to 3.9.3, and 4.x prior to 4.0.1 might allow remote malicious users to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
Mageia Project Mageia 4
Mageia Project Mageia 3
Wordpress Wordpress 3.8
Wordpress Wordpress 3.9
Wordpress Wordpress 3.9.2
Wordpress Wordpress 3.8.1
Wordpress Wordpress 3.8.2
Wordpress Wordpress 3.8.3
Wordpress Wordpress 3.8.4
Wordpress Wordpress
Wordpress Wordpress 3.9.1
Wordpress Wordpress 4.0
Debian Debian Linux 7.0
Debian Debian Linux 8.0
NA
CVE-2014-9039
wp-login.php in WordPress prior to 3.7.5, 3.8.x prior to 3.8.5, 3.9.x prior to 3.9.3, and 4.x prior to 4.0.1 might allow remote malicious users to reset passwords by leveraging access to an e-mail account that received a password-reset message.
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Mageia Project Mageia 4
Mageia Project Mageia 3
Wordpress Wordpress 3.9.1
Wordpress Wordpress 3.9.2
Wordpress Wordpress 4.0
Wordpress Wordpress 3.8.1
Wordpress Wordpress 3.8.3
Wordpress Wordpress 3.9
Wordpress Wordpress
Wordpress Wordpress 3.8
Wordpress Wordpress 3.8.2
Wordpress Wordpress 3.8.4
NA
CVE-2015-2296
The resolve_redirects function in sessions.py in requests 2.1.0 up to and including 2.5.3 allows remote malicious users to conduct session fixation attacks via a cookie without a host value in a redirect.
Mageia Project Mageia 4.0
Python Requests 2.1.0
Python Requests 2.2.1
Python Requests 2.3.0
Python Requests 2.4.1
Python Requests 2.4.3
Python Requests 2.5.0
Python Requests 2.5.1
Python Requests 2.5.2
Python Requests 2.4.0
Python Requests 2.4.2
Python Requests 2.5.3
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started