Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mandrakesoft vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1014
statd in nfs-utils 1.257 and previous versions does not ignore the SIGPIPE signal, which allows remote malicious users to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.
Nfs Nfs-utils 1.0.6
Debian Debian Linux 3.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 10.1
Redhat Enterprise Linux Desktop 3.0
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 3.0
NA
CVE-2004-1158
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a ...
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.0
Kde Konqueror 3.1.1
Kde Konqueror 3.1.2
Kde Konqueror 3.3
Kde Konqueror 3.3.1
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5b
Kde Konqueror 3.1
Kde Konqueror 3.2.2.6
Kde Konqueror 3.2.3
Kde Konqueror 3.0.3
Kde Konqueror 3.0.5
Kde Konqueror 3.1.5
Kde Konqueror 3.2.1
Kde Konqueror 3.0.1
Kde Konqueror 3.0.2
Kde Konqueror 3.1.3
Kde Konqueror 3.1.4
Kde Konqueror 3.3.2
NA
CVE-2004-1171
KDE 3.2.x and 3.3.0 up to and including 3.3.2, when saving credentials that are (1) manually entered by the user or (2) created by the SMB protocol handler, stores those credentials for plaintext in the user's .desktop file, which may be created with world-readable permissio...
Kde Kde 3.3
Kde Kde 3.3.1
Redhat Fedora Core Core 3.0
Kde Kde 3.3.2
Mandrakesoft Mandrake Linux 10.0
Kde Kde 3.2
Kde Kde 3.2.1
Mandrakesoft Mandrake Linux 10.1
Kde Kde 3.2.2
Kde Kde 3.2.3
Redhat Fedora Core Core 2.0
NA
CVE-2004-2395
Memory leak in passwd 0.68 allows local users to cause a denial of service (memory consumption) via a large number of failed read attempts from the password buffer.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux 9.0
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
NA
CVE-2004-2392
libuser 0.51.7 allows malicious users to cause a denial of service (crash or disk consumption) via unknown attack vectors, related to read failures and other bugs.
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 10.0
NA
CVE-2004-2394
Off-by-one error in passwd 0.68 and previous versions, when using the --stdin option, causes passwd to use the first 78 characters of a password instead of the first 79, which results in a small reduction of the search space required for brute force attacks.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 9.0
NA
CVE-2004-0817
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote malicious users to execute arbitrary code via a crafted BMP file.
Enlightenment Imlib 1.9
Enlightenment Imlib 1.9.2
Enlightenment Imlib 1.9.3
Enlightenment Imlib2 1.0
Enlightenment Imlib2 1.0.1
Imagemagick Imagemagick 5.4.3
Imagemagick Imagemagick 5.4.4.5
Imagemagick Imagemagick 6.0.2
Sun Java Desktop System 2.0
Enlightenment Imlib 1.9.1
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.4
Enlightenment Imlib 1.9.5
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Imagemagick Imagemagick 5.4.7
Imagemagick Imagemagick 5.4.8
Sun Java Desktop System 2003
Conectiva Linux 10.0
Enlightenment Imlib 1.9.11
Enlightenment Imlib 1.9.12
Enlightenment Imlib 1.9.6
NA
CVE-2004-0802
Buffer overflow in the BMP loader in imlib2 prior to 1.1.2 allows remote malicious users to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.11
Enlightenment Imlib 1.9.6
Enlightenment Imlib 1.9.7
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.5
Imagemagick Imagemagick 5.4.8
Imagemagick Imagemagick 5.4.8.2.1.1.0
Imagemagick Imagemagick 5.5.3.2.1.2.0
Conectiva Linux 9.0
Enlightenment Imlib 1.9
Enlightenment Imlib 1.9.1
Enlightenment Imlib 1.9.4
Enlightenment Imlib 1.9.5
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Imagemagick Imagemagick 5.4.4.5
Imagemagick Imagemagick 5.4.7
Sun Java Desktop System 2003
Conectiva Linux 10.0
Enlightenment Imlib 1.9.2
Enlightenment Imlib 1.9.3
NA
CVE-2004-0803
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and previous versions, related to buffer overflows and integer overflows, allow remote malicious users to execute arbitrary code via TIFF files.
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.6
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.6
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
NA
CVE-2004-0805
Buffer overflow in layer2.c in mpg123 0.59r and possibly mpg123 0.59s allows remote malicious users to execute arbitrary code via a certain (1) mp3 or (2) mp2 file.
Mpg123 Mpg123 0.59r
Mpg123 Mpg123 0.59s
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 10.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »