Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openpkg openpkg 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0594
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote malicious users to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init func...
Openpkg Openpkg 2.0
Trustix Secure Linux 2.0
Hp Hp-ux B.11.23
Openpkg Openpkg 2.1
Hp Hp-ux B.11.11
Avaya Converged Communications Server 2.0
Trustix Secure Linux 1.5
Hp Hp-ux B.11.00
Trustix Secure Linux 2.1
Debian Debian Linux 3.0
Hp Hp-ux B.11.22
Php Php 5.0.0
Php Php
1 EDB exploit
NA
CVE-2004-0918
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache prior to 2.4.STABLE7 allows remote malicious users to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
Squid Squid 2.5 .stable3
Squid Squid 2.1 Patch2
Squid Squid 2.4 .stable7
Openpkg Openpkg 2.1
Squid Squid 2.0 Patch2
Squid Squid 2.4 .stable2
Squid Squid 2.3 .stable4
Squid Squid 2.3 .stable5
Squid Squid 2.5 .stable5
Openpkg Openpkg Current
Squid Squid 3.0 Pre1
Squid Squid 2.5 .stable6
Openpkg Openpkg 2.2
Squid Squid 2.4 .stable6
Squid Squid 2.5 .stable1
Squid Squid 2.4
Squid Squid 2.5 .stable4
Squid Squid 3.0 Pre3
Squid Squid 3.0 Pre2
Redhat Fedora Core Core 2.0
Trustix Secure Linux 2.0
Ubuntu Ubuntu Linux 4.1
7.8
CVSSv3
CVE-2004-0940
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Openpkg Openpkg 2.0
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Apache Http Server
Slackware Slackware Linux 9.0
Slackware Slackware Linux 8.1
Slackware Slackware Linux 10.0
Hp Hp-ux 11.11
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Slackware Slackware Linux 8.0
Suse Suse Linux 8.2
Slackware Slackware Linux 9.1
Slackware Slackware Linux Current
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Hp Hp-ux 11.00
Hp Hp-ux 11.22
Suse Suse Linux 9.1
Hp Hp-ux 11.20
Suse Suse Linux 8.1
2 EDB exploits
NA
CVE-2004-0990
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in...
Gd Graphics Library Gdlib 2.0.26
Gd Graphics Library Gdlib 2.0.15
Openpkg Openpkg 2.1
Gd Graphics Library Gdlib 2.0.22
Openpkg Openpkg Current
Gd Graphics Library Gdlib 2.0.23
Gd Graphics Library Gdlib 2.0.27
Gd Graphics Library Gdlib 2.0.20
Gd Graphics Library Gdlib 1.8.4
Openpkg Openpkg 2.2
Gd Graphics Library Gdlib 2.0.1
Gd Graphics Library Gdlib 2.0.21
Gd Graphics Library Gdlib 2.0.28
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Suse Suse Linux 9.1
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
1 EDB exploit
NA
CVE-2004-0421
The Portable Network Graphics library (libpng) 1.0.15 and previous versions allows malicious users to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
Openpkg Openpkg 2.0
Libpng Libpng 1.2.2
Libpng Libpng 1.0.8
Libpng Libpng 1.2.4
Libpng Libpng 1.0.14
Libpng Libpng 1.2.0
Openpkg Openpkg 1.3
Libpng Libpng 1.0.11
Libpng Libpng 1.0.9
Libpng Libpng 1.0.13
Libpng Libpng 1.0.6
Libpng Libpng 1.0.7
Libpng Libpng 1.2.3
Libpng Libpng 1.0.5
Libpng Libpng 1.2.1
Redhat Libpng 1.2.2-16
Libpng Libpng 1.0.12
Libpng Libpng 1.2.5
Libpng Libpng 1.0.0
Redhat Libpng 1.2.2-20
Libpng Libpng 1.0.10
Trustix Secure Linux 2.0
9.8
CVSSv3
CVE-2004-0772
Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and previous versions may allow remote malicious users to execute arbitrary code.
Mit Kerberos 5
Openpkg Openpkg 2.0
Openpkg Openpkg 2.1
Debian Debian Linux 3.0
NA
CVE-2004-1065
Buffer overflow in the exif_read_data function in PHP prior to 4.3.10 and PHP 5.x up to 5.0.2 allows remote malicious users to execute arbitrary code via a long section name in an image file.
Php Php 4.3.9
Php Php 3.0
Php Php 3.0.5
Php Php 3.0.11
Php Php 4.2.0
Php Php 3.0.1
Php Php 3.0.2
Php Php 4.1.0
Openpkg Openpkg 2.1
Php Php 4.3.4
Php Php 4.0.4
Php Php 4.3.0
Php Php 4.0.5
Php Php 5.0
Php Php 3.0.8
Php Php 4.3.6
Php Php 3.0.13
Php Php 5.0.1
Php Php 4.0.7
Php Php 4.3.7
Php Php 4.2.2
Php Php 3.0.7
NA
CVE-2004-1019
The deserialization code in PHP prior to 4.3.10 and PHP 5.x up to 5.0.2 allows remote malicious users to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative ref...
Php Php 4.3.9
Php Php 3.0
Php Php 3.0.5
Php Php 3.0.11
Php Php 4.2.0
Php Php 3.0.1
Php Php 3.0.2
Php Php 4.1.0
Openpkg Openpkg 2.1
Php Php 4.3.4
Php Php 4.0.4
Php Php 4.3.0
Php Php 4.0.5
Php Php 5.0
Php Php 3.0.8
Php Php 4.3.6
Php Php 3.0.13
Php Php 5.0.1
Php Php 4.0.7
Php Php 4.3.7
Php Php 4.2.2
Php Php 3.0.7
NA
CVE-2004-0957
Unknown vulnerability in MySQL 3.23.58 and previous versions, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activitie...
Openpkg Openpkg 2.1
Openpkg Openpkg Current
Openpkg Openpkg 2.2
Oracle Mysql 3.20
Oracle Mysql 3.20.32a
Oracle Mysql 3.21
Oracle Mysql 3.22
Oracle Mysql 3.22.26
Oracle Mysql 3.22.27
Oracle Mysql 3.22.28
Oracle Mysql 3.22.29
Oracle Mysql 3.22.30
Oracle Mysql 3.22.32
Oracle Mysql 3.23
Oracle Mysql 3.23.2
Oracle Mysql 3.23.3
Oracle Mysql 3.23.4
Oracle Mysql 3.23.5
Oracle Mysql 3.23.8
Oracle Mysql 3.23.9
Oracle Mysql 3.23.10
Oracle Mysql 3.23.22
NA
CVE-2004-1011
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 up to and including 2.2.8, with the imapmagicplus option enabled, allows remote malicious users to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
Carnegie Mellon University Cyrus Imap Server 2.2.6
Carnegie Mellon University Cyrus Imap Server 2.1.10
Conectiva Linux 9.0
Carnegie Mellon University Cyrus Imap Server 2.2.8
Carnegie Mellon University Cyrus Imap Server 2.2.0 Alpha
Carnegie Mellon University Cyrus Imap Server 2.1.9
Carnegie Mellon University Cyrus Imap Server 2.2.5
Carnegie Mellon University Cyrus Imap Server 2.2.2 Beta
Openpkg Openpkg Current
Carnegie Mellon University Cyrus Imap Server 2.1.16
Carnegie Mellon University Cyrus Imap Server 2.2.7
Carnegie Mellon University Cyrus Imap Server 2.2.3
Conectiva Linux 10.0
Carnegie Mellon University Cyrus Imap Server 2.2.1 Beta
Carnegie Mellon University Cyrus Imap Server 2.1.7
Carnegie Mellon University Cyrus Imap Server 2.2.4
Redhat Fedora Core Core 2.0
Trustix Secure Linux 2.0
Ubuntu Ubuntu Linux 4.1
Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
Redhat Fedora Core Core 3.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »