Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
conectiva vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0801
Unknown vulnerability in foomatic-rip in Foomatic prior to 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
Conectiva Linux 9.0
Linuxprinting.org Foomatic-filters 3.1
Linuxprinting.org Foomatic-filters 3.0.1
Sun Java Desktop System 2003
Sun Java Desktop System 2.0
Linuxprinting.org Foomatic-filters 3.0
Linuxprinting.org Foomatic-filters 3.0.2
Conectiva Linux 10.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
NA
CVE-2003-0540
The address parser code in Postfix 1.1.12 and previous versions allows remote malicious users to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To...
Wietse Venema Postfix 1.0.21
Wietse Venema Postfix 2001-11-15
Wietse Venema Postfix 2000-02-28
Wietse Venema Postfix 1999-12-31
Conectiva Linux 8.0
Wietse Venema Postfix 1.1.12
Wietse Venema Postfix 1999-09-06
Wietse Venema Postfix 1.1.11
Conectiva Linux 7.0
2 EDB exploits
NA
CVE-2004-0884
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and previous versions trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.13
Conectiva Linux 9.0
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.11
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 2.1.14
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.17
Conectiva Linux 10.0
Cyrus Sasl 2.1.9
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.15
NA
CVE-2005-0754
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote malicious users to execute arbitrary code.
Conectiva Linux 9.0
Kde Quanta 3.1
Conectiva Linux 10.0
Kde Kde 3.3.2
Ubuntu Ubuntu Linux 4.1
Kde Kde 3.3.1
Kde Kde 3.2.2
Kde Kde 3.2.1
Ubuntu Ubuntu Linux 5.04
Kde Kde 3.4
Kde Kde 3.3
Kde Kde 3.2
Kde Kde 3.2.3
Redhat Fedora Core Core 3.0
Gentoo Linux
NA
CVE-2000-1095
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
Conectiva Linux 5.1
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Suse Suse Linux 7.0
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2005-0699
Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and previous versions allow remote malicious users to execute arbitrary code via RADIUS authentication packets with large length values.
Conectiva Linux 9.0
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Ethereal Group Ethereal 0.10.7
Ethereal Group Ethereal 0.10.5
Conectiva Linux 10.0
Ethereal Group Ethereal 0.10.6
Ethereal Group Ethereal 0.10.8
Ethereal Group Ethereal 0.10.9
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Altlinux Alt Linux Compact 2.3
Altlinux Alt Linux Junior 2.3
Redhat Enterprise Linux Desktop 4.0
NA
CVE-2004-0626
The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote malicious users to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a...
Conectiva Linux 10
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8.0
Linux Linux Kernel 2.6.0
Suse Suse Linux 9.1
Gentoo Linux
Suse Suse Linux 8.1
NA
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
NA
CVE-2004-0807
Samba 3.0.6 and previous versions allows remote malicious users to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.
Samba Samba 3.0.3
Conectiva Linux 9.0
Samba Samba 3.0.2a
Samba Samba 3.0.5
Samba Samba 3.0.6
Sgi Samba 3.0.1
Sgi Samba 3.0
Samba Samba 3.0.4
Samba Samba 3.0.0
Sgi Samba 3.0.3
Sgi Samba 3.0.4
Sgi Samba 3.0.6
Sgi Samba 3.0.5
Samba Samba 3.0.2
Conectiva Linux 10.0
Samba Samba 3.0.1
Sgi Samba 3.0.2
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8
Suse Suse Linux 9.1
Mandrakesoft Mandrake Linux 10.0
NA
CVE-2004-0902
Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla prior to 1.7.3, and Thunderbird prior to 0.8 allow remote malicious users to cause a denial of service (application crash) or execute arbitrary code via (1) the "Send page" funct...
Mozilla Thunderbird 0.7.2
Conectiva Linux 9.0
Mozilla Mozilla 1.7
Mozilla Mozilla 1.7.1
Mozilla Thunderbird 0.7.3
Mozilla Thunderbird 0.7
Conectiva Linux 10.0
Mozilla Mozilla 1.7.2
Mozilla Thunderbird 0.7.1
Suse Suse Linux 9.0
Redhat Enterprise Linux 2.1
Redhat Linux 7.3
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Suse Suse Linux 8
Suse Suse Linux 1.0
Redhat Fedora Core Core 1.0
Redhat Linux 9.0
Suse Suse Linux 9.1
Suse Suse Linux 8.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »