Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 2.1 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2018-0487
ARM mbed TLS prior to 1.3.22, prior to 2.1.10, and prior to 2.7.0 allows remote malicious users to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTL...
Arm Mbed Tls
Debian Debian Linux 8.0
Debian Debian Linux 9.0
668
VMScore
CVE-2018-0488
ARM mbed TLS prior to 1.3.22, prior to 2.1.10, and prior to 2.7.0, when the truncated HMAC extension and CBC are used, allows remote malicious users to execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS sess...
Arm Mbed Tls
Debian Debian Linux 8.0
Debian Debian Linux 9.0
668
VMScore
CVE-2016-0718
Expat allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
Mozilla Firefox
Apple Mac Os X
Suse Linux Enterprise Server 11
Suse Studio Onsite 1.3
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Debuginfo 11
Opensuse Leap 42.1
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Libexpat Project Libexpat
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mcafee Policy Auditor
Python Python
1 Article
668
VMScore
CVE-2015-6525
Multiple integer overflows in the evbuffer API in Libevent 2.0.x prior to 2.0.22 and 2.1.x prior to 2.1.5-beta allow context-dependent malicious users to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_...
Debian Debian Linux 7.1
Libevent Project Libevent 2.0.5
Libevent Project Libevent 2.0.20
Libevent Project Libevent 2.0.7
Libevent Project Libevent 2.0.19
Libevent Project Libevent 2.0.8
Libevent Project Libevent 2.0.18
Libevent Project Libevent 2.0.12
Libevent Project Libevent 2.1.4
Libevent Project Libevent 2.0.6
Libevent Project Libevent 2.0.3
Libevent Project Libevent 2.0.10
Libevent Project Libevent 2.0.9
Libevent Project Libevent 2.1.3
Libevent Project Libevent 2.1.2
Libevent Project Libevent 2.0.4
Libevent Project Libevent 2.0.15
Libevent Project Libevent 2.0.17
Libevent Project Libevent 2.1.1
Libevent Project Libevent 2.0.14
Libevent Project Libevent 2.0.1
Libevent Project Libevent 2.0.13
668
VMScore
CVE-2014-6272
Multiple integer overflows in the evbuffer API in Libevent 1.4.x prior to 1.4.15, 2.0.x prior to 2.0.22, and 2.1.x prior to 2.1.5-beta allow context-dependent malicious users to cause a denial of service or possibly have other unspecified impact via "insanely large inputs&qu...
Debian Debian Linux 7.0
Libevent Project Libevent 2.0.5
Libevent Project Libevent 2.0.20
Libevent Project Libevent 1.4.6
Libevent Project Libevent 2.0.7
Libevent Project Libevent 2.0.19
Libevent Project Libevent 2.0.8
Libevent Project Libevent 2.0.18
Libevent Project Libevent 1.4.12
Libevent Project Libevent 2.0.12
Libevent Project Libevent 2.1.4
Libevent Project Libevent 1.4.14
Libevent Project Libevent 1.4.3
Libevent Project Libevent 2.0.6
Libevent Project Libevent 1.4.0
Libevent Project Libevent 1.4.2
Libevent Project Libevent 2.0.3
Libevent Project Libevent 2.0.10
Libevent Project Libevent 2.0.9
Libevent Project Libevent 2.1.3
Libevent Project Libevent 1.4.1
Libevent Project Libevent 1.4.9
668
VMScore
CVE-2011-2688
SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and previous versions for the Apache HTTP Server allows remote malicious users to execute arbitrary SQL commands via the user field.
Mod Authnz External Project Mod Authnz External
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
668
VMScore
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Pdftohtml Pdftohtml 0.32a
Easy Software Products Cups 1.1.19 Rc5
Xpdf Xpdf 2.0
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.16
Xpdf Xpdf 1.0
Kde Koffice 1.3 Beta2
Sgi Propack 3.0
Easy Software Products Cups 1.1.7
Pdftohtml Pdftohtml 0.35
Xpdf Xpdf 0.91
Easy Software Products Cups 1.0.4 8
Gnome Gpdf 0.112
Kde Koffice 1.3.3
Pdftohtml Pdftohtml 0.32b
Easy Software Products Cups 1.1.15
Kde Koffice 1.3 Beta3
Gnome Gpdf 0.110
Easy Software Products Cups 1.1.13
Pdftohtml Pdftohtml 0.33a
Xpdf Xpdf 2.3
Kde Koffice 1.3
668
VMScore
CVE-2004-1004
Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and previous versions allow remote malicious users to have an unknown impact.
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.6
Redhat Enterprise Linux 2.1
Suse Suse Linux 9.2
Debian Debian Linux 3.0
Suse Suse Linux 9.0
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 8.2
668
VMScore
CVE-2004-1005
Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and previous versions allow remote malicious users to have an unknown impact.
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.6
Redhat Enterprise Linux 2.1
Suse Suse Linux 9.2
Debian Debian Linux 3.0
Suse Suse Linux 9.0
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 8.2
668
VMScore
CVE-2004-1176
Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and previous versions allows remote malicious users to cause a denial of service and possibly execute arbitrary code.
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.6
Redhat Enterprise Linux 2.1
Suse Suse Linux 9.2
Debian Debian Linux 3.0
Suse Suse Linux 9.0
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 8.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »