Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 5.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2011-4362
Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 prior to 1.4.30 and 1.5 before SVN revision 2806 allows remote malicious users to cause a denial of service (segmentation fault) via crafted base64 input ...
Lighttpd Lighttpd
Lighttpd Lighttpd 1.5.0
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Debian Debian Linux 7.0
1 EDB exploit
7.8
CVSSv2
CVE-2009-1270
libclamav/untar.c in ClamAV prior to 0.95 allows remote malicious users to cause a denial of service (infinite loop) via a crafted TAR file that causes (1) clamd and (2) clamscan to hang.
Clamav Clamav
Debian Debian Linux 4.0
Debian Debian Linux 5.0
Canonical Ubuntu Linux 8.10
4.9
CVSSv2
CVE-2009-1073
nss-ldapd prior to 0.6.8 uses world-readable permissions for the /etc/nss-ldapd.conf file, which allows local users to obtain a cleartext password for the LDAP server by reading the bindpw field.
Debian Nss-ldap
Debian Debian Linux 5.0
4.9
CVSSv2
CVE-2010-0727
The gfs2_lock function in the Linux kernel prior to 2.6.34-rc1-next-20100312, and the gfs_lock function in the Linux kernel on Red Hat Enterprise Linux (RHEL) 5 and 6, does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows loc...
Linux Linux Kernel
Debian Debian Linux 5.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
4.3
CVSSv2
CVE-2011-2691
The png_err function in pngerror.c in libpng 1.0.x prior to 1.0.55, 1.2.x prior to 1.2.45, 1.4.x prior to 1.4.8, and 1.5.x prior to 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote malicious users to cause a denial...
Libpng Libpng
Fedoraproject Fedora 14
Debian Debian Linux 5.0
Debian Debian Linux 6.0
3.3
CVSSv2
CVE-2012-5521
quagga (ospf6d) 0.99.21 has a DoS flaw in the way the ospf6d daemon performs routes removal
Quagga Quagga 0.99.21
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
7.5
CVSSv2
CVE-2011-2897
gdk-pixbuf up to and including 2.31.1 has GIF loader buffer overflow when initializing decompression tables due to an input validation flaw
Gnome Gdk-pixbuf
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 5.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2011-3631
Hardlink prior to 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and...
Hardlink Project Hardlink
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
3.6
CVSSv2
CVE-2011-3632
Hardlink prior to 0.1.2 operates on full file system objects path names which can allow a local malicious user to use this flaw to conduct symlink attacks.
Hardlink Project Hardlink
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
6.8
CVSSv2
CVE-2011-3630
Hardlink prior to 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, lead...
Hardlink Project Hardlink
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »