Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian most vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-1400
Heap-based buffer overflow in the repeat() function for PostgreSQL prior to 7.2.2 allows malicious users to execute arbitrary code by causing repeat() to generate a large string.
Postgresql Postgresql 7.1.3
Postgresql Postgresql 7.2
Postgresql Postgresql 7.1.1
Postgresql Postgresql 7.1.2
Postgresql Postgresql 7.0.3
Postgresql Postgresql 7.1
Postgresql Postgresql 6.3.2
Postgresql Postgresql 6.5.3
Postgresql Postgresql 7.2.1
7.5
CVSSv2
CVE-2002-1219
Buffer overflow in named in BIND 4 versions 4.9.10 and previous versions, and 8 versions 8.3.3 and previous versions, allows remote malicious users to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).
Isc Bind 4.9.6
Isc Bind 4.9.7
Isc Bind 8.2.4
Isc Bind 8.2.5
Isc Bind 4.9.8
Isc Bind 4.9.9
Isc Bind 8.2.6
Isc Bind 8.3.0
Isc Bind 8.2
Isc Bind 8.2.1
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 8.3.3
Isc Bind 4.9.10
Isc Bind 4.9.5
Isc Bind 8.2.2
Isc Bind 8.2.3
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Openbsd Openbsd 3.0
Freebsd Freebsd 4.6
Openbsd Openbsd 3.1
7.5
CVSSv2
CVE-2002-0029
Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 up to and including 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote malicious users to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetb...
Isc Bind 4.9.2
Isc Bind 4.9.4
Isc Bind 4.9.10
Isc Bind 4.9.6
Isc Bind 4.9.7
Isc Bind 4.9.8
Isc Bind 4.9.9
Isc Bind 4.9.3
Isc Bind 4.9.5
Astaro Security Linux 2.0.23
Astaro Security Linux 2.0.25
Astaro Security Linux 2.0.26
Astaro Security Linux 2.0.27
Astaro Security Linux 2.0.30
Astaro Security Linux 3.2.0
Astaro Security Linux 3.2.10
Astaro Security Linux 2.0.24
Astaro Security Linux 3.2.11
1 Nmap script
7.5
CVSSv2
CVE-2002-1113
summary_graph_functions.php in Mantis 0.17.3 and previous versions allows remote malicious users to execute arbitrary PHP code by modifying the g_jpgraph_path parameter to reference the location of the PHP code.
Mantis Mantis 0.15.10
Mantis Mantis 0.15.7
Mantis Mantis 0.15.8
Mantis Mantis 0.15.5
Mantis Mantis 0.15.6
Mantis Mantis 0.17.2
Mantis Mantis 0.17.3
Mantis Mantis 0.15.3
Mantis Mantis 0.15.4
Mantis Mantis 0.17.0
Mantis Mantis 0.17.1
Mantis Mantis 0.15.11
Mantis Mantis 0.15.12
Mantis Mantis 0.15.9
Mantis Mantis 0.16.0
Mantis Mantis 0.16.1
1 EDB exploit
7.5
CVSSv2
CVE-2002-1114
config_inc2.php in Mantis prior to 0.17.4 allows remote malicious users to execute arbitrary code or read arbitrary files via the parameters (1) g_bottom_include_page, (2) g_top_include_page, (3) g_css_include_file, (4) g_meta_include_file, or (5) a cookie.
Mantis Mantis 0.17.0
Mantis Mantis 0.17.3
Mantis Mantis 0.17.1
Mantis Mantis 0.17.2
7.5
CVSSv2
CVE-2002-0059
The decompression algorithm in zlib 1.1.3 and previous versions, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote malicious users to execute arbitrary code vi...
Zlib Zlib
7.5
CVSSv2
CVE-2002-0082
The dbm and shm session cache code in mod_ssl prior to 2.8.7-1.3.23, and Apache-SSL prior to 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote malicious users to use a buffer overflow to execute arbitrary code via a large cli...
Apache-ssl Apache-ssl 1.45
Apache-ssl Apache-ssl 1.46
Mod Ssl Mod Ssl 2.8.5
Mod Ssl Mod Ssl 2.8.6
Apache-ssl Apache-ssl 1.42
Apache-ssl Apache-ssl 1.44
Mod Ssl Mod Ssl 2.8.3
Mod Ssl Mod Ssl 2.8.4
Mod Ssl Mod Ssl 2.7.1
Mod Ssl Mod Ssl 2.8
Apache-ssl Apache-ssl 1.40
Apache-ssl Apache-ssl 1.41
Mod Ssl Mod Ssl 2.8.1
Mod Ssl Mod Ssl 2.8.2
3 EDB exploits
3 Github repositories
7.2
CVSSv2
CVE-2022-1679
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the sys...
Linux Linux Kernel
Debian Debian Linux 10.0
Netapp H410c Firmware -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H300e Firmware -
Netapp H500e Firmware -
Netapp H700e Firmware -
Netapp H410s Firmware -
2 Github repositories
7.2
CVSSv2
CVE-2021-4197
An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both f...
Linux Linux Kernel
Debian Debian Linux 10.0
Oracle Communications Cloud Native Core Binding Support Function 22.1.3
Oracle Communications Cloud Native Core Binding Support Function 22.1.1
Oracle Communications Cloud Native Core Binding Support Function 22.2.0
Broadcom Brocade Fabric Operating System Firmware -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
Netapp H410c Firmware -
7.2
CVSSv2
CVE-2021-39685
In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: ...
Google Android -
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »