Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mandrakesoft mandrake linux 9.2 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2004-0587
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.
Mandrakesoft Mandrake Linux Corporate Server 2.1
Redhat Fedora Core Core 1.0
Suse Suse Linux 8.1
Mandrakesoft Mandrake Linux 10.0
Suse Suse Linux 8
Suse Suse Linux 9.0
Mandrakesoft Mandrake Linux 9.2
7.2
CVSSv2
CVE-2004-0834
Format string vulnerability in Speedtouch USB driver prior to 1.3.1 allows local users to execute arbitrary code via (1) modem_run, (2) pppoa2, or (3) pppoa3.
Speedtouch Speedtouch Usb Driver 1.1
Speedtouch Speedtouch Usb Driver 1.2 Beta3
Speedtouch Speedtouch Usb Driver 1.2 Beta2
Speedtouch Speedtouch Usb Driver 1.0
Speedtouch Speedtouch Usb Driver 1.3
Mandrakesoft Mandrake Multi Network Firewall 8.2
Speedtouch Speedtouch Usb Driver 1.2 Beta1
Speedtouch Speedtouch Usb Driver 1.2
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.1
Mandrakesoft Mandrake Linux 9.0
Gentoo Linux 1.4
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 10.0
5
CVSSv2
CVE-2003-1020
The format_send_to_gui function in formats.c for irssi prior to 0.8.9 allows remote IRC users to cause a denial of service (crash).
Irssi Irssi 0.8.7
Irssi Irssi 0.8.8
Irssi Irssi 0.8.5
Irssi Irssi 0.8.6
Irssi Irssi 0.8.4
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 9.2
5
CVSSv2
CVE-2004-0983
The CGI module in Ruby 1.6 prior to 1.6.8, and 1.8 prior to 1.8.2, allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.
Yukihiro Matsumoto Ruby 1.8.2 Pre2
Yukihiro Matsumoto Ruby 1.6.7
Yukihiro Matsumoto Ruby 1.8
Yukihiro Matsumoto Ruby 1.6
Yukihiro Matsumoto Ruby 1.8.1
Yukihiro Matsumoto Ruby 1.8.2 Pre1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 10.1
Ubuntu Ubuntu Linux 4.1
Gentoo Linux
2.1
CVSSv2
CVE-2004-0497
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Conectiva Linux 10
Redhat Enterprise Linux 2.1
Suse Suse Linux 8.2
Suse Suse Linux 9.0
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 9.1
Redhat Enterprise Linux 3.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 8.0
Suse Suse Linux 8.1
Gentoo Linux
Linux Linux Kernel 2.0
Suse Suse Linux 9.1
Trustix Secure Linux 2
1 EDB exploit
5
CVSSv2
CVE-2004-0634
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote malicious users to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
5
CVSSv2
CVE-2004-0633
The iSNS dissector for Ethereal 0.10.3 up to and including 0.10.4 allows remote malicious users to cause a denial of service (process abort) via an integer overflow.
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
1 EDB exploit
2.1
CVSSv2
CVE-2004-0974
The netatalk package in Trustix Secure Linux 1.5 up to and including 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
Netatalk Open Source Apple File Share Protocol Suite 1.5 Pre6
Netatalk Open Source Apple File Share Protocol Suite 1.6.4
Netatalk Open Source Apple File Share Protocol Suite 1.6.1
Mandrakesoft Mandrake Linux 10.1
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Redhat Fedora Core Core 2.0
Redhat Fedora Core Core 3.0
7.2
CVSSv2
CVE-2004-0496
Multiple unknown vulnerabilities in Linux kernel 2.6 allow local users to gain privileges or access kernel memory, a different set of vulnerabilities than those identified in CVE-2004-0495, as found by the Sparse source code checking tool.
Suse Suse Linux Office Server
Suse Suse Email Server 3.1
Suse Suse Linux Connectivity Server
Suse Suse Linux Database Server
Suse Suse Linux Firewall
Mandrakesoft Mandrake Multi Network Firewall 8.2
Suse Suse Email Server 3
Sun Sunos 5.8
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 9.1
Sun Sunos 5.9
Suse Suse Linux 7
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 8
Gentoo Linux
Linux Linux Kernel 2.6.0
Sun Solaris 9.0
2.1
CVSSv2
CVE-2004-0975
The der_chop script in the openssl package in Trustix Secure Linux 1.5 up to and including 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Openssl Openssl 0.9.6f
Openssl Openssl 0.9.6g
Openssl Openssl 0.9.6h
Openssl Openssl 0.9.7d
Openssl Openssl 0.9.6b
Openssl Openssl 0.9.6c
Openssl Openssl 0.9.6k
Openssl Openssl 0.9.6l
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.6i
Openssl Openssl 0.9.6j
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.6e
Openssl Openssl 0.9.6m
Openssl Openssl 0.9.7c
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 10.1
Gentoo Linux
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »