Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ubuntu linux 8.04 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2008-2285
The ssh-vulnkey tool on Ubuntu Linux 7.04, 7.10, and 8.04 LTS does not recognize authorized_keys lines that contain options, which makes it easier for remote malicious users to exploit CVE-2008-0166 by guessing a key that was not identified by this tool.
Ubuntu Linux 7.04
Ubuntu Linux 7.10
Ubuntu Linux 8.04
9.3
CVSSv2
CVE-2008-4306
Buffer overflow in enscript prior to 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence.
Ubuntu Linux 7.10
Ubuntu Linux 8.04
Ubuntu Linux 8.10
Ubuntu Linux 6.06
4.6
CVSSv2
CVE-2009-0365
nm-applet.conf in GNOME NetworkManager prior to 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.
Ubuntu Ubuntu Linux 6.06
Ubuntu Ubuntu Linux 8.10
Ubuntu Ubuntu Linux 7.10
Ubuntu Ubuntu Linux 8.04
2.1
CVSSv2
CVE-2011-0463
The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel prior to 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive informati...
Linux Linux Kernel
Canonical Ubuntu Linux 8.04
7.2
CVSSv2
CVE-2010-4656
The iowarrior_write function in drivers/usb/misc/iowarrior.c in the Linux kernel prior to 2.6.37 does not properly allocate memory, which might allow local users to trigger a heap-based buffer overflow, and consequently cause a denial of service or gain privileges, via a long rep...
Linux Linux Kernel
Canonical Ubuntu Linux 8.04
7.2
CVSSv2
CVE-2011-1017
Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and previous versions might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table.
Linux Linux Kernel
Canonical Ubuntu Linux 8.04
1 Github repository
5
CVSSv2
CVE-2010-1624
The msn_emoticon_msg function in slp.c in the MSN protocol plugin in libpurple in Pidgin prior to 2.7.0 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a custom emoticon in a malformed SLP message.
Pidgin Pidgin
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
6.8
CVSSv2
CVE-2007-4829
Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and previous versions allows user-assisted remote malicious users to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has ".." sequences.
Archive\\ \\ Tar Project
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 7.10
5
CVSSv2
CVE-2009-1378
Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and previous versions 0.9.8 versions allow remote malicious users to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have seque...
Openssl Openssl
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
9.3
CVSSv2
CVE-2008-2712
Vim 7.1.314, 6.4, and other versions allows user-assisted remote malicious users to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, ...
Vim Vim
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 6.06
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-21111
CVE-2024-32884
IDOR
CVE-2023-1000
CVE-2024-33260
CVE-2024-3682
reflected XSS
race condition
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »