Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse suse linux 9.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1767
traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).
Novell Open Enterprise Server 9
Novell Linux Desktop 9
Suse Suse Linux 9.0
Suse Suse Linux 9.3
Suse Suse Linux 9.2
Suse Suse Linux 8
Suse Suse Linux 1.0
Suse Suse Linux 9.1
NA
CVE-2005-0337
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote malicious users to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Wietse Venema Postfix 2.1.3
Redhat Enterprise Linux 4.0
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Suse Suse Linux 8.2
Suse Suse Linux 8.0
Suse Suse Linux 8.1
Redhat Enterprise Linux Desktop 4.0
Suse Suse Linux 9.2
NA
CVE-2005-0207
Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT.
Conectiva Linux 10.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.5.1
Linux Linux Kernel 2.5.10
Linux Linux Kernel 2.5.17
Linux Linux Kernel 2.5.18
Linux Linux Kernel 2.5.24
Linux Linux Kernel 2.5.25
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
NA
CVE-2005-0005
Heap-based buffer overflow in psd.c for ImageMagick 6.1.0, 6.1.7, and possibly earlier versions allows remote malicious users to execute arbitrary code via a .PSD image file with a large number of layers.
Graphicsmagick Graphicsmagick 1.1.3
Graphicsmagick Graphicsmagick 1.1.4
Imagemagick Imagemagick 6.0.2.5
Imagemagick Imagemagick 6.0.3
Imagemagick Imagemagick 6.1.1.6
Imagemagick Imagemagick 6.1.2
Imagemagick Imagemagick 6.2.0.7
Sgi Propack 3.0
Graphicsmagick Graphicsmagick 1.0.6
Graphicsmagick Graphicsmagick 1.1
Imagemagick Imagemagick 6.0.1
Imagemagick Imagemagick 6.0.2
Imagemagick Imagemagick 6.0.8
Imagemagick Imagemagick 6.1
Imagemagick Imagemagick 6.2
Imagemagick Imagemagick 6.2.0.4
Graphicsmagick Graphicsmagick 1.0
Imagemagick Imagemagick 5.4.7
Imagemagick Imagemagick 6.0
Imagemagick Imagemagick 6.0.6
Imagemagick Imagemagick 6.0.7
Imagemagick Imagemagick 6.1.6
NA
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.0.4 8
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.17
Easy Software Products Cups 1.1.18
Easy Software Products Cups 1.1.4 5
Easy Software Products Cups 1.1.6
Kde Koffice 1.3.3
Kde Koffice 1.3 Beta1
Pdftohtml Pdftohtml 0.33a
Pdftohtml Pdftohtml 0.34
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
Xpdf Xpdf 2.0
Xpdf Xpdf 2.1
Ascii Ptex 3.1.4
Cstex Cstetex 2.0.2
Easy Software Products Cups 1.1.15
Easy Software Products Cups 1.1.16
Easy Software Products Cups 1.1.4 2
Easy Software Products Cups 1.1.4 3
Kde Koffice 1.3
NA
CVE-2005-0085
Cross-site scripting (XSS) vulnerability in ht://dig (htdig) prior to 3.1.6-r7 allows remote malicious users to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.
Htdig Htdig 3.2.0b3
Htdig Htdig 3.2.0b4
Htdig Htdig 3.1.5
Htdig Htdig 3.1.5 7
Htdig Htdig 3.2.0b5
Htdig Htdig 3.2.0b6
Htdig Htdig 3.1.5 8
Htdig Htdig 3.1.6
Htdig Htdig 3.2.0
Htdig Htdig 3.2.0b2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 8.2
Suse Suse Linux 9.0
Mandrakesoft Mandrake Linux Corporate Server 3.0
Suse Suse Linux 9.1
Mandrakesoft Mandrake Linux 10.0
Redhat Fedora Core Core 3.0
Suse Suse Linux 8.0
Suse Suse Linux 9.2
Mandrakesoft Mandrake Linux 10.1
Suse Suse Linux 8.1
NA
CVE-2005-1043
exif.c in PHP prior to 4.3.11 allows remote malicious users to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
Php Php 4.3.1
Php Php 4.3.10
Php Php 4.3.2
Php Php 4.3.9
Sgi Propack 3.0
Php Php 4.3.0
Php Php 4.3.7
Php Php 4.3.8
Php Php 4.3.5
Php Php 4.3.6
Php Php 4.3.3
Php Php 4.3.4
Conectiva Linux 10.0
Conectiva Linux 9.0
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.4
Suse Suse Linux 4.2
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 6.1
Suse Suse Linux 6.4
Apple Mac Os X 10.4
NA
CVE-2004-1004
Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and previous versions allow remote malicious users to have an unknown impact.
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.6
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.55
Debian Debian Linux 3.0
Gentoo Linux
Suse Suse Linux 8.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Workstation 7.0
Redhat Enterprise Linux 2.1
NA
CVE-2004-1005
Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and previous versions allow remote malicious users to have an unknown impact.
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Debian Debian Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 9.1
Suse Suse Linux 9.2
Gentoo Linux
NA
CVE-2004-1009
Midnight commander (mc) 4.5.55 and previous versions allows remote malicious users to cause a denial of service (infinite loop) via unknown attack vectors.
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.6
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.55
Debian Debian Linux 3.0
Gentoo Linux
Suse Suse Linux 8.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Workstation 7.0
Redhat Linux Advanced Workstation 2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »