Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 8.0 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2018-5704
Open On-Chip Debugger (OpenOCD) 0.10.0 does not block attempts to use HTTP POST for sending data to 127.0.0.1 port 4444, which allows remote malicious users to conduct cross-protocol scripting attacks, and consequently execute arbitrary commands, via a crafted web site.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Openocd Open On-chip Debugger 0.10.0
9.3
CVSSv2
CVE-2017-14176
Bazaar up to and including 2.7.0, when Subprocess SSH is used, allows remote malicious users to execute arbitrary commands via a bzr+ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-16228, CVE-2017-...
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 14.04
Canonical Bazaar
9.3
CVSSv2
CVE-2017-12904
Improper Neutralization of Special Elements used in an OS Command in bookmarking function of Newsbeuter versions 0.7 up to and including 2.9 allows remote malicious users to perform user-assisted code execution by crafting an RSS item that includes shell code in its title and/or ...
Newsbeuter Newsbeuter 1.0
Newsbeuter Newsbeuter 2.4
Newsbeuter Newsbeuter 2.3
Newsbeuter Newsbeuter 0.8
Newsbeuter Newsbeuter 1.3
Newsbeuter Newsbeuter 0.9
Newsbeuter Newsbeuter 2.0
Newsbeuter Newsbeuter 2.1
Newsbeuter Newsbeuter 0.8.1
Newsbeuter Newsbeuter 2.8
Newsbeuter Newsbeuter 2.5
Newsbeuter Newsbeuter 0.8.2
Newsbeuter Newsbeuter 2.6
Newsbeuter Newsbeuter 0.7
Newsbeuter Newsbeuter 2.2
Newsbeuter Newsbeuter 1.1
Newsbeuter Newsbeuter 2.7
Newsbeuter Newsbeuter 2.9
Newsbeuter Newsbeuter 0.9.1
Newsbeuter Newsbeuter 1.2
Debian Debian Linux 8.0
Debian Debian Linux 7.0
9.3
CVSSv2
CVE-2015-5211
Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in th...
Vmware Spring Framework 3.2.2
Vmware Spring Framework 3.2.1
Vmware Spring Framework 3.2.8
Vmware Spring Framework 3.2.7
Vmware Spring Framework 3.2.10
Vmware Spring Framework 3.2.9
Vmware Spring Framework 3.2.4
Vmware Spring Framework 3.2.3
Vmware Spring Framework 3.2.6
Vmware Spring Framework 3.2.5
Vmware Spring Framework 4.0.1
Vmware Spring Framework 4.0.6
Vmware Spring Framework 4.0.8
Vmware Spring Framework 3.2.14
Vmware Spring Framework 4.2.1
Vmware Spring Framework 4.1.6
Vmware Spring Framework 4.0.2
Vmware Spring Framework 4.0.3
Vmware Spring Framework 4.0.4
Vmware Spring Framework 4.0.5
Vmware Spring Framework 3.2.11
Vmware Spring Framework 3.2.12
2 Github repositories
9.3
CVSSv2
CVE-2016-1244
The extractTree function in unADF allows remote malicious users to execute arbitrary code via shell metacharacters in a directory name in an adf file.
Unadf Project Unadf 1.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
1 Github repository
9.3
CVSSv2
CVE-2016-4738
libxslt in Apple iOS prior to 10, OS X prior to 10.12, tvOS prior to 10, and watchOS prior to 3 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
Apple Watchos
Apple Tvos
Apple Iphone Os
Apple Mac Os X
Debian Debian Linux 8.0
Debian Debian Linux 9.0
9.3
CVSSv2
CVE-2016-1834
Heap-based buffer overflow in the xmlStrncat function in libxml2 prior to 2.9.4, as used in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memo...
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
Apple Tvos
Apple Iphone Os
Apple Mac Os X
Apple Watchos
Debian Debian Linux 8.0
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Tus 7.2
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Eus 7.4
Redhat Enterprise Linux Server Eus 7.3
Redhat Enterprise Linux Server Eus 7.2
Redhat Enterprise Linux Server Eus 7.5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Aus 7.2
Redhat Enterprise Linux Desktop 7.0
9.3
CVSSv2
CVE-2016-1669
The Zone::New function in zone.cc in Google V8 prior to 5.0.71.47, as used in Google Chrome prior to 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote malicious users to cause a denial of service (buffer overflow) or possibl...
Debian Debian Linux 8.0
Google Chrome
Opensuse Opensuse 13.1
Google V8
Nodejs Node.js
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
1 Article
9.3
CVSSv2
CVE-2016-3981
Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG prior to 0.7.6 allows remote malicious users to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file.
Optipng Project Optipng
Canonical Ubuntu Linux 12.04
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
9.3
CVSSv2
CVE-2016-1645
Multiple integer signedness errors in the opj_j2k_update_image_data function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome prior to 49.0.2623.87, allow remote malicious users to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspeci...
Google Chrome
Debian Debian Linux 8.0
Opensuse Leap 42.1
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Opensuse Suse Linux Enterprise Server 12.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »