Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
conectiva vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-0801
Unknown vulnerability in foomatic-rip in Foomatic prior to 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
Conectiva Linux 10.0
Conectiva Linux 9.0
Sun Java Desktop System 2.0
Sun Java Desktop System 2003
Linuxprinting.org Foomatic-filters 3.0.2
Linuxprinting.org Foomatic-filters 3.1
Linuxprinting.org Foomatic-filters 3.0
Linuxprinting.org Foomatic-filters 3.0.1
Trustix Secure Linux 2.1
Trustix Secure Linux 2.0
7.5
CVSSv2
CVE-2004-0827
Multiple buffer overflows in the ImageMagick graphics library 5.x prior to 5.4.4, and 6.x prior to 6.0.6.2, allow remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
Enlightenment Imlib 1.9.11
Enlightenment Imlib 1.9.12
Enlightenment Imlib 1.9.6
Enlightenment Imlib 1.9.7
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.5
Enlightenment Imlib2 1.1
Imagemagick Imagemagick 5.4.8.2.1.1.0
Imagemagick Imagemagick 5.5.3.2.1.2.0
Conectiva Linux 9.0
Enlightenment Imlib 1.9.1
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.4
Enlightenment Imlib 1.9.5
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Imagemagick Imagemagick 5.4.7
Imagemagick Imagemagick 5.4.8
Sun Java Desktop System 2003
Conectiva Linux 10.0
Enlightenment Imlib 1.9.13
Enlightenment Imlib 1.9.14
7.5
CVSSv2
CVE-2002-1278
The mailconf module in Linuxconf 1.24, and other versions prior to 1.28, on Conectiva Linux 6.0 through 8, and possibly other distributions, generates the Sendmail configuration file (sendmail.cf) in a way that configures Sendmail to run as an open mail relay, which allows remote...
Jacques Gelinas Linuxconf 1.2.5r3
Jacques Gelinas Linuxconf 1.2.4r2
7.5
CVSSv2
CVE-2001-0690
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote malicious user to execute arbitrary code via format strings in SMTP mail headers.
Conectiva Linux
University Of Cambridge Exim
Redhat Linux
Debian Debian Linux 4.0
1 EDB exploit
7.5
CVSSv2
CVE-2001-0439
licq prior to 1.0.3 allows remote malicious users to execute arbitrary commands via shell metacharacters in a URL.
Conectiva Linux 5.0
Licq Licq
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 4.0
Conectiva Linux 4.0es
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Freebsd Freebsd 4.2
Mandrakesoft Mandrake Linux 7.1
Freebsd Freebsd 3.5.1
7.5
CVSSv2
CVE-2001-0440
Buffer overflow in logging functions of licq prior to 1.0.3 allows remote malicious users to cause a denial of service, and possibly execute arbitrary commands.
Conectiva Linux Ecommerce
Conectiva Linux Prg Graficos
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 6.0
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 4.0
Conectiva Linux 4.0es
Licq Licq
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
1 EDB exploit
7.5
CVSSv2
CVE-2001-0473
Format string vulnerability in Mutt prior to 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Conectiva Linux
Mutt Mutt
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 6.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
7.2
CVSSv2
CVE-2005-0750
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 up to and including 2.4.30-rc1 and 2.6 up to and including 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Conectiva Linux 10.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
Suse Suse Linux 1.0
Suse Suse Linux 9.3
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
4 EDB exploits
7.2
CVSSv2
CVE-2004-0884
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and previous versions trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.11
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.9
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.13
Conectiva Linux 10.0
Conectiva Linux 9.0
Cyrus Sasl 1.5.24
Cyrus Sasl 2.1.14
Cyrus Sasl 2.1.15
Cyrus Sasl 1.5.27
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.17
7.2
CVSSv2
CVE-2004-1337
The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.
Gnu Realtime Linux Security Module 0.8.7
Conectiva Linux 10.0
Ubuntu Ubuntu Linux 4.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »