Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 6.0 vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2013-6890
denyhosts 2.6 uses an incorrect regular expression when analyzing authentication logs, which allows remote malicious users to cause a denial of service (incorrect block of IP addresses) via crafted login names.
Fedoraproject Fedora
Debian Debian Linux 7.0
Debian Debian Linux 7.1
Debian Debian Linux 6.0
Phil Schwartz Denyhosts 2.6
1 EDB exploit
605
VMScore
CVE-2020-6383
Type confusion in V8 in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
605
VMScore
CVE-2020-6384
Use after free in WebAudio in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
605
VMScore
CVE-2020-6386
Use after free in speech in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
686
VMScore
CVE-2020-6418
Type confusion in V8 in Google Chrome before 80.0.3987.122 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 EDB exploit
4 Github repositories
2 Articles
578
VMScore
CVE-2010-4664
In ConsoleKit prior to 0.4.2, an intended security policy restriction bypass was found. This flaw allows an authenticated system user to escalate their privileges by initiating a remote VNC session.
Consolekit Project Consolekit
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Redhat Enterprise Linux 6.0
356
VMScore
CVE-2012-0049
OpenTTD prior to 1.1.5 contains a Denial of Service (slow read attack) that prevents users from joining the server.
Openttd Openttd
Debian Debian Linux 6.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 15
Fedoraproject Fedora 16
383
VMScore
CVE-2011-2691
The png_err function in pngerror.c in libpng 1.0.x prior to 1.0.55, 1.2.x prior to 1.2.45, 1.4.x prior to 1.4.8, and 1.5.x prior to 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote malicious users to cause a denial...
Libpng Libpng
Fedoraproject Fedora 14
Debian Debian Linux 5.0
Debian Debian Linux 6.0
383
VMScore
CVE-2011-0482
Google Chrome prior to 8.0.552.237 and Chrome OS prior to 8.0.552.344 do not properly perform a cast of an unspecified variable during handling of anchors, which allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a crafted HTM...
Google Chrome Os
Google Chrome
Debian Debian Linux 6.0
Debian Debian Linux 7.0
632
VMScore
CVE-2012-0920
Use-after-free vulnerability in Dropbear SSH Server 0.52 up to and including 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command reque...
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 6.0
Debian Debian Linux 7.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »