Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu patch vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2013-4577
A certain Debian patch for GNU GRUB uses world-readable permissions for grub.cfg, which allows local users to obtain password hashes, as demonstrated by reading the password_pbkdf2 directive in the file.
Gnu Grub -
4.6
CVSSv2
CVE-2012-3410
Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash prior to 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.
Gnu Bash 4.2
4.3
CVSSv2
CVE-2012-2317
The Debian php_crypt_revamped.patch patch for PHP 5.3.x, as used in the php5 package prior to 5.3.3-7+squeeze4 in Debian GNU/Linux squeeze, the php5 package prior to 5.3.2-1ubuntu4.17 in Ubuntu 10.04 LTS, and the php5 package prior to 5.3.5-1ubuntu7.10 in Ubuntu 11.04, does not p...
Debian Php5-common 5.3.3-7+squeeze4
Debian Php5-common
Debian Debian Linux
Canonical Php5 5.3.2-1ubuntu4.17
Canonical Php5
Canonical Ubuntu Linux 10.04
Canonical Php5 5.3.5-1ubuntu7.10
Canonical Ubuntu Linux 11.04
4.3
CVSSv2
CVE-2011-5024
Cross-site scripting (XSS) vulnerability in mmsearch/design in the Mailman/htdig integration patch for Mailman allows remote malicious users to inject arbitrary web script or HTML via the config parameter.
Gnu Mailman 2.1.3
Gnu Mailman 2.1.8
Gnu Mailman 2.1.11
Gnu Mailman 2.1.2
Gnu Mailman 2.1.9
Gnu Mailman 2.0.13
Gnu Mailman 2.1.6
Gnu Mailman 2.1
Gnu Mailman 2.1.10
Gnu Mailman 2.1.1
Gnu Mailman 2.1.12
Gnu Mailman 2.1.7
Gnu Mailman 2.1.4
5.8
CVSSv2
CVE-2010-4651
Directory traversal vulnerability in util.c in GNU patch 2.6.1 and previous versions allows user-assisted remote malicious users to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
Gnu Gnu Patch 2.5.4
Gnu Gnu Patch
Gnu Gnu Patch 2.5.9
Gnu Gnu Patch 2.6
Gnu Gnu Patch 2.5
5
CVSSv2
CVE-2010-4695
A certain Fedora patch for gif2png.c in gif2png 2.5.1 and 2.5.2, as distributed in gif2png-2.5.1-1200.fc12 on Fedora 12 and gif2png_2.5.2-1 on Debian GNU/Linux, truncates a GIF pathname specified on the command line, which might allow remote malicious users to create PNG files in...
Catb Gif2png 2.5.1
Catb Gif2png 2.5.2
6.9
CVSSv2
CVE-2010-2953
Untrusted search path vulnerability in a certain Debian GNU/Linux patch for the couchdb script in CouchDB 0.8.0 allows local users to gain privileges via a crafted shared library in the current working directory.
Apache Couchdb 0.8.0
4.3
CVSSv2
CVE-2008-4989
The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS prior to 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle malicious users to insert a spoofed cer...
Gnu Gnutls
Fedoraproject Fedora 9
Fedoraproject Fedora 8
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 4.0
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 10
Suse Linux Enterprise 11.0
Suse Linux Enterprise 10.0
Opensuse Opensuse
9.3
CVSSv2
CVE-2007-0238
Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite prior to 2.2, and 1.x prior to 1.1.5 Patch, allows user-assisted remote malicious users to execute arbitrary code via a document with a long Note.
Openoffice Openoffice
9.3
CVSSv2
CVE-2007-1536
Integer underflow in the file_printf function in the "file" program prior to 4.20 allows user-assisted malicious users to execute arbitrary code via a file that triggers a heap-based buffer overflow.
File File
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »