Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openpkg openpkg 1.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0413
libsvn_ra_svn in Subversion 1.0.4 trusts the length field of (1) svn://, (2) svn+ssh://, and (3) other svn protocol URL strings, which allows remote malicious users to cause a denial of service (memory consumption) and possibly execute arbitrary code via an integer overflow that ...
Openpkg Openpkg 2.0
Subversion Subversion 1.0.4
Subversion Subversion 1.0.2
Subversion Subversion 1.0.1
Subversion Subversion 1.0
Subversion Subversion 1.0.3
Openpkg Openpkg
NA
CVE-2004-1997
Kolab stores OpenLDAP passwords in plaintext in the slapd.conf file, which may be installed world-readable, which allows local users to gain privileges.
Kolab Kolab Groupware Server 1.0
Openpkg Openpkg 2.0
Kolab Kolab Groupware Server 1.0.7
Kolab Kolab Groupware Server 1.0.6
Kolab Kolab Groupware Server 1.0.5
Kolab Kolab Groupware Server 1.0.3
Kolab Kolab Groupware Server 1.0.8
Kolab Kolab Groupware Server 1.0.1
NA
CVE-2007-5116
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent malicious users to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
Larry Wall Perl 5.8.6
Mandrakesoft Mandrake Multi Network Firewall 2.0
Openpkg Openpkg Current
Redhat Enterprise Linux 1.0
9.8
CVSSv3
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote malicious users to execute arbitrary code.
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.13
Conectiva Linux 9.0
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.11
Openpkg Openpkg 2.1
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 2.1.14
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.17
Openpkg Openpkg 2.2
Suse Suse Cvsup 16.1h 36.i586
Conectiva Linux 10.0
Cyrus Sasl 2.1.9
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.15
Suse Suse Linux 9.0
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.1.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started