Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 10.04 vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv3
CVE-2012-2736
In NetworkManager 0.9.2.0, when a new wireless network was created with WPA/WPA2 security in AdHoc mode, it created an open/insecure network.
Gnome Networkmanager 0.9.2.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Opensuse Opensuse 12.1
NA
CVE-2015-0840
The dpkg-source command in Debian dpkg prior to 1.16.16 and 1.17.x prior to 1.17.25 allows remote malicious users to bypass signature verification via a crafted Debian source control file (.dsc).
Debian Dpkg 1.17.1
Debian Dpkg 1.17.2
Debian Dpkg 1.17.5
Debian Dpkg 1.17.6
Debian Dpkg 1.17.7
Debian Dpkg 1.17.14
Debian Dpkg 1.17.15
Debian Dpkg 1.17.22
Debian Dpkg 1.17.23
Debian Dpkg
Debian Dpkg 1.17.0
Debian Dpkg 1.17.8
Debian Dpkg 1.17.9
Debian Dpkg 1.17.16
Debian Dpkg 1.17.17
Debian Dpkg 1.17.24
Debian Dpkg 1.17.10
Debian Dpkg 1.17.11
Debian Dpkg 1.17.18
Debian Dpkg 1.17.19
Debian Dpkg 1.17.3
Debian Dpkg 1.17.4
NA
CVE-2015-2316
The utils.html.strip_tags function in Django 1.6.x prior to 1.6.11, 1.7.x prior to 1.7.7, and 1.8.x prior to 1.8c1, when using certain versions of Python, allows remote malicious users to cause a denial of service (infinite loop) by increasing the length of the input string.
Oracle Solaris 11.2
Djangoproject Django 1.6.10
Djangoproject Django 1.6.2
Djangoproject Django 1.6.1
Djangoproject Django 1.7
Djangoproject Django 1.7.3
Djangoproject Django 1.7.4
Djangoproject Django 1.6.4
Djangoproject Django 1.6.3
Djangoproject Django 1.6
Djangoproject Django 1.7.1
Djangoproject Django 1.7.2
Djangoproject Django 1.6.7
Djangoproject Django 1.6.6
Djangoproject Django 1.6.5
Djangoproject Django 1.6.9
Djangoproject Django 1.6.8
Djangoproject Django 1.7.5
Djangoproject Django 1.7.6
Djangoproject Django 1.8.0
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
NA
CVE-2015-2317
The utils.http.is_safe_url function in Django prior to 1.4.20, 1.5.x, 1.6.x prior to 1.6.11, 1.7.x prior to 1.7.7, and 1.8.x prior to 1.8c1 does not properly validate URLs, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via a control character i...
Opensuse Opensuse 13.2
Fedoraproject Fedora 22
Debian Debian Linux 7.0
Djangoproject Django 1.5.1
Djangoproject Django 1.5.2
Djangoproject Django 1.5.10
Djangoproject Django 1.5.11
Djangoproject Django 1.6.1
Djangoproject Django 1.6.10
Djangoproject Django 1.6.8
Djangoproject Django 1.6.9
Djangoproject Django 1.7.1
Djangoproject Django 1.7.2
Djangoproject Django 1.5
Djangoproject Django 1.5.7
Djangoproject Django 1.5.8
Djangoproject Django 1.5.9
Djangoproject Django 1.6
Djangoproject Django 1.6.6
Djangoproject Django 1.6.7
Djangoproject Django 1.7
Djangoproject Django 1.8.0
NA
CVE-2015-1572
Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs prior to 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015...
E2fsprogs Project E2fsprogs
Debian Debian Linux 7.0
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
NA
CVE-2014-9402
The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) prior to 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote malicious users to cause a denial of service (infinite loop) by sending a positive answer while a network...
Gnu Glibc
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
NA
CVE-2015-0247
Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs prior to 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
E2fsprogs Project E2fsprogs
Debian Debian Linux 7.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 10.04
Fedoraproject Fedora 20
Fedoraproject Fedora 21
NA
CVE-2014-9658
The tt_face_load_kern function in sfnt/ttkern.c in FreeType prior to 2.5.4 enforces an incorrect minimum table length, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Oracle Solaris 11.2
Oracle Solaris 10.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Freetype Freetype
Debian Debian Linux 7.0
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Redhat Enterprise Linux Hpc Node 6
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Workstation 6.0
NA
CVE-2014-9660
The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType prior to 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote malicious users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF fon...
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Oracle Solaris 10.0
Oracle Solaris 11.2
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node 6
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
NA
CVE-2014-9661
type42/t42parse.c in FreeType prior to 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote malicious users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Hpc Node 6
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Freetype Freetype
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Fedoraproject Fedora 21
Fedoraproject Fedora 20
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »