Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xli xli 1.16 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0775
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote malicious users to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Xloadimage Xloadimage 4.1
Xli Xli 1.17
Xli Xli 1.16
1 EDB exploit
NA
CVE-2005-0638
xloadimage prior to 4.1-r2, and xli prior to 1.17, allows malicious users to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.
Xli Xli 1.17
Xli Xli 1.16
Xli Xli 1.14
Xli Xli 1.15
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 9.3
Suse Suse Linux 4.0
Suse Suse Linux 7.1
Suse Suse Linux 9.2
Suse Suse Linux 9.1
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Altlinux Alt Linux 2.3
Suse Suse Linux 7.3
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 7.2
Suse Suse Linux 8.0
Suse Suse Linux 7.0
Suse Suse Linux 5.2
Suse Suse Linux 3.0
NA
CVE-2005-0639
Multiple vulnerabilities in xli prior to 1.17 may allow remote malicious users to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files.
Xli Xli 1.17
Xli Xli 1.16
Xli Xli 1.14
Xli Xli 1.15
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 9.3
Suse Suse Linux 4.0
Suse Suse Linux 7.1
Suse Suse Linux 9.2
Suse Suse Linux 9.1
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Altlinux Alt Linux 2.3
Suse Suse Linux 7.3
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 7.2
Suse Suse Linux 8.0
Suse Suse Linux 7.0
Suse Suse Linux 5.2
Suse Suse Linux 3.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started