Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 2.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-2834
Integer overflow in the TIFF parser in OpenOffice.org (OOo) prior to 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote malicious users to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation o...
Apache Openoffice
Sun Staroffice 6.0
Sun Staroffice 7.0
Sun Staroffice 8.0
Sun Starsuite
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 7.04
NA
CVE-2015-3427
Quassel prior to 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote malicious users to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete ...
Quassel-irc Quassel
Debian Debian Linux 8.0
8.8
CVSSv3
CVE-2022-30550
An issue exists in the auth component in Dovecot 2.2 and 2.3 prior to 2.3.20. When two passdb configuration entries exist with the same driver and args settings, incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied setti...
Dovecot Dovecot
Dovecot Dovecot 2.2
Debian Debian Linux 10.0
9.8
CVSSv3
CVE-2019-11500
In Dovecot prior to 2.2.36.4 and 2.3.x prior to 2.3.7.2 (and Pigeonhole prior to 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
Dovecot Dovecot
Dovecot Pigeonhole
Debian Debian Linux 8.0
Fedoraproject Fedora 30
7.5
CVSSv3
CVE-2021-39242
An issue exists in HAProxy 2.2 prior to 2.2.16, 2.3 prior to 2.3.13, and 2.4 prior to 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled.
Haproxy Haproxy
Debian Debian Linux 11.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
7.5
CVSSv3
CVE-2021-39240
An issue exists in HAProxy 2.2 prior to 2.2.16, 2.3 prior to 2.3.13, and 2.4 prior to 2.4.3. It does not ensure that the scheme and path portions of a URI have the expected characters. For example, the authority field (as observed on a target HTTP/2 server) might differ from what...
Haproxy Haproxy
Debian Debian Linux 11.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
5.3
CVSSv3
CVE-2021-39241
An issue exists in HAProxy 2.0 prior to 2.0.24, 2.2 prior to 2.2.16, 2.3 prior to 2.3.13, and 2.4 prior to 2.4.3. An HTTP method name may contain a space followed by the name of a protected resource. It is possible that a server would interpret this as a request for that protecte...
Haproxy Haproxy
Debian Debian Linux 11.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
7.5
CVSSv3
CVE-2022-39028
telnetd in GNU Inetutils up to and including 2.3, MIT krb5-appl up to and including 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available ...
Gnu Inetutils
Mit Kerberos 5
Debian Debian Linux 10.0
Netkit-telnet Project Netkit-telnet
NA
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
7.5
CVSSv3
CVE-2021-40346
An integer overflow exists in HAProxy 2.0 up to and including 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an malicious user to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
Haproxy Haproxy
Haproxy Haproxy 2.5
Debian Debian Linux 11.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
7 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »