Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 8.0 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2019-15292
An issue exists in the Linux kernel prior to 5.0.9. There is a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c.
Linux Linux Kernel
Debian Debian Linux 8.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
1 Github repository
890
VMScore
CVE-2019-11627
gpg-key2ps in signing-party 1.1.x and 2.x prior to 2.10-1 contains an unsafe shell call enabling shell injection via a User ID.
Signing-party Project Signing-party
Debian Debian Linux 8.0
Opensuse Leap 15.0
Opensuse Leap 42.3
890
VMScore
CVE-2011-2767
mod_perl 2.0 up to and including 2.0.10 allows malicious users to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP...
Apache Mod Perl
Debian Debian Linux 8.0
Redhat Enterprise Linux 7.4
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux 6.7
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux 7.3
Redhat Enterprise Linux 7.5
Redhat Enterprise Linux 7.6
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
890
VMScore
CVE-2017-7810
Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 56, Firefox ESR...
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server Eus 7.5
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Eus 7.4
Redhat Enterprise Linux Workstation 7.0
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Thunderbird
890
VMScore
CVE-2017-7376
Buffer overflow in libxml2 allows remote malicious users to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Xmlsoft Libxml2
Google Android 7.1.2
Google Android 6.0.1
Google Android 5.0.2
Google Android 5.1.1
Google Android 4.4.4
Google Android 7.1.1
Google Android 7.0
Google Android 6.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
1 Github repository
890
VMScore
CVE-2017-17458
In Mercurial prior to 4.4.1, it is possible that a specially malformed repository can cause Git subrepositories to run arbitrary code in the form of a .git/hooks/post-update script checked into the repository. Typical use of Mercurial prevents construction of such repositories, b...
Mercurial Mercurial
Debian Debian Linux 7.0
Debian Debian Linux 8.0
890
VMScore
CVE-2014-9906
Use-after-free vulnerability in DBD::mysql prior to 4.029 allows malicious users to cause a denial of service (program crash) or possibly execute arbitrary code via vectors related to a lost server connection.
Debian Debian Linux 8.0
Dbd-mysql Project Dbd-mysql
890
VMScore
CVE-2016-3955
The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel prior to 4.5.3 allows remote malicious users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Linux Linux Kernel
Debian Debian Linux 8.0
1 Github repository
890
VMScore
CVE-2016-2195
Integer overflow in the PointGFp constructor in Botan prior to 1.10.11 and 1.11.x prior to 1.11.27 allows remote malicious users to overwrite memory and possibly execute arbitrary code via a crafted ECC point, which triggers a heap-based buffer overflow.
Botan Project Botan 1.11.21
Botan Project Botan 1.11.20
Botan Project Botan 1.11.13
Botan Project Botan 1.11.12
Botan Project Botan 1.11.4
Botan Project Botan 1.11.3
Botan Project Botan 1.11.23
Botan Project Botan 1.11.22
Botan Project Botan 1.11.15
Botan Project Botan 1.11.14
Botan Project Botan 1.11.7
Botan Project Botan 1.11.6
Botan Project Botan 1.11.5
Botan Project Botan 1.11.26
Botan Project Botan 1.11.19
Botan Project Botan 1.11.18
Botan Project Botan 1.11.11
Botan Project Botan 1.11.10
Botan Project Botan 1.11.2
Botan Project Botan 1.11.1
Botan Project Botan 1.11.25
Botan Project Botan 1.11.24
890
VMScore
CVE-2015-0857
Cool Projects TarDiff allows remote malicious users to execute arbitrary commands via shell metacharacters in the name of a (1) tar file or (2) file within a tar file.
Tardiff Project Tardiff -
Debian Debian Linux 8.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »