Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ubuntu ubuntu 8.0.4 lts vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-1295
Apport prior to 0.108.4 on Ubuntu 8.04 LTS, prior to 0.119.2 on Ubuntu 8.10, and prior to 1.0-0ubuntu5.2 on Ubuntu 9.04 does not properly remove files from the application's crash-report directory, which allows local users to delete arbitrary files via unspecified vectors.
Ubuntu Ubuntu 9.0.4
Ubuntu Ubuntu 8.1.0
Ubuntu Ubuntu 8.0.4 Lts
Apport Apport
NA
CVE-2006-5540
backend/parser/analyze.c in PostgreSQL 8.1.x prior to 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via certain aggregate functions in an UPDATE statement, which are not properly handled during a "MIN/MAX index optimization."
Postgresql Postgresql 8.0.7
Postgresql Postgresql 8.0.2
Postgresql Postgresql 7.2.7
Postgresql Postgresql 7.3.3
Postgresql Postgresql 7.2
Postgresql Postgresql 7.3
Postgresql Postgresql 8.1
Postgresql Postgresql 6.3.2
Postgresql Postgresql 7.4.1
Postgresql Postgresql 7.3.9
Postgresql Postgresql 7.3.10
Postgresql Postgresql 7.2.3
Postgresql Postgresql 8.1.3
Postgresql Postgresql 7.4.6
Postgresql Postgresql 7.1.1
Postgresql Postgresql 7.4.11
Postgresql Postgresql 8.0.3
Postgresql Postgresql 7.3.15
Postgresql Postgresql 7.4.7
Postgresql Postgresql 7.3.11
Postgresql Postgresql 7.1.3
Postgresql Postgresql 7.4.3
8.1
CVSSv3
CVE-2017-12617
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a...
Apache Tomcat 7.0.2
Apache Tomcat 8.0.4
Apache Tomcat 8.0.10
Apache Tomcat 7.0.49
Apache Tomcat 8.0.30
Apache Tomcat 8.0.44
Apache Tomcat 7.0.12
Apache Tomcat 7.0.62
Apache Tomcat 8.0.17
Apache Tomcat 7.0.20
Apache Tomcat 8.0.7
Apache Tomcat 7.0.34
Apache Tomcat 8.0.26
Apache Tomcat 7.0.58
Apache Tomcat 8.5.2
Apache Tomcat 7.0.8
Apache Tomcat 7.0.55
Apache Tomcat 8.5.9
Apache Tomcat 8.5.4
Apache Tomcat 7.0.1
Apache Tomcat 7.0.5
Apache Tomcat 8.0.40
2 EDB exploits
21 Github repositories
NA
CVE-2006-2313
PostgreSQL 8.1.x prior to 8.1.4, 8.0.x prior to 8.0.8, 7.4.x prior to 7.4.13, 7.3.x prior to 7.3.15, and previous versions versions allows context-dependent malicious users to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, a...
Postgresql Postgresql 8.0.7
Postgresql Postgresql 8.0.2
Postgresql Postgresql 7.3.3
Postgresql Postgresql 7.3
Postgresql Postgresql 8.1
Postgresql Postgresql 7.4.1
Postgresql Postgresql 7.3.9
Postgresql Postgresql 7.3.10
Postgresql Postgresql 8.1.3
Postgresql Postgresql 7.4.6
Postgresql Postgresql 7.4.11
Postgresql Postgresql 8.0.3
Postgresql Postgresql 7.4.7
Postgresql Postgresql 7.3.11
Postgresql Postgresql 7.4.3
Postgresql Postgresql 7.3.6
Postgresql Postgresql 7.4.9
Postgresql Postgresql 7.4.5
Postgresql Postgresql 7.3.8
Postgresql Postgresql 7.4.8
Postgresql Postgresql 8.0.6
Postgresql Postgresql 7.4
NA
CVE-2006-2314
PostgreSQL 8.1.x prior to 8.1.4, 8.0.x prior to 8.0.8, 7.4.x prior to 7.4.13, 7.3.x prior to 7.3.15, and previous versions versions allows context-dependent malicious users to bypass SQL injection protection methods in applications that use multibyte encodings that allow the &quo...
Postgresql Postgresql 8.0.7
Postgresql Postgresql 8.0.2
Postgresql Postgresql 7.3.3
Postgresql Postgresql 7.3
Postgresql Postgresql 8.1
Postgresql Postgresql 7.4.1
Postgresql Postgresql 7.3.9
Postgresql Postgresql 7.3.10
Postgresql Postgresql 8.1.3
Postgresql Postgresql 7.4.6
Postgresql Postgresql 7.4.11
Postgresql Postgresql 8.0.3
Postgresql Postgresql 7.4.7
Postgresql Postgresql 7.3.11
Postgresql Postgresql 7.4.3
Postgresql Postgresql 7.3.6
Postgresql Postgresql 7.4.9
Postgresql Postgresql 7.4.5
Postgresql Postgresql 7.3.8
Postgresql Postgresql 7.4.8
Postgresql Postgresql 8.0.6
Postgresql Postgresql 7.4
NA
CVE-2009-3230
The core server component in PostgreSQL 8.4 prior to 8.4.1, 8.3 prior to 8.3.8, 8.2 prior to 8.2.14, 8.1 prior to 8.1.18, 8.0 prior to 8.0.22, and 7.4 prior to 7.4.26 does not use the appropriate privileges for the (1) RESET ROLE and (2) RESET SESSION AUTHORIZATION operations, wh...
Postgresql Postgresql 7.4.16
Postgresql Postgresql 8.1.10
Postgresql Postgresql 8.1.6
Postgresql Postgresql 8.2.9
Postgresql Postgresql 8.0.7
Postgresql Postgresql 8.0.2
Postgresql Postgresql 8.1.15
Postgresql Postgresql 8.1.7
Postgresql Postgresql 8.3.6
Postgresql Postgresql 8.2.10
Postgresql Postgresql 7.4.24
Postgresql Postgresql 8.2.4
Postgresql Postgresql 7.4.22
Postgresql Postgresql 7.4.21
Postgresql Postgresql 8.0.17
Postgresql Postgresql 8.0.10
Postgresql Postgresql 7.4.19
Postgresql Postgresql 8.1
Postgresql Postgresql 8.2.11
Postgresql Postgresql 8.1.13
Postgresql Postgresql 8.0.12
Postgresql Postgresql 8.2.12
NA
CVE-2007-6600
PostgreSQL 8.2 prior to 8.2.6, 8.1 prior to 8.1.11, 8.0 prior to 8.0.15, 7.4 prior to 7.4.19, and 7.3 prior to 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SE...
Postgresql Postgresql 7.4.16
Postgresql Postgresql 8.1.10
Postgresql Postgresql 8.1.6
Postgresql Postgresql 8.0.7
Postgresql Postgresql 8.0.2
Postgresql Postgresql 8.1.7
Postgresql Postgresql 7.3.3
Postgresql Postgresql 8.2.4
Postgresql Postgresql 7.3
Postgresql Postgresql 8.0.10
Postgresql Postgresql 8.0.12
Postgresql Postgresql 8.0.9
Postgresql Postgresql 7.4.1
Postgresql Postgresql 7.3.9
Postgresql Postgresql 7.3.10
Postgresql Postgresql 8.2.2
Postgresql Postgresql 8.0.0
Postgresql Postgresql 8.1.3
Postgresql Postgresql 7.4.14
Postgresql Postgresql 7.4.6
Postgresql Postgresql 7.3.18
Postgresql Postgresql 7.4.11
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started