Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
propack vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2004-0108
The isag utility, which processes sysstat data, allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CAN-2004-0107.
Redhat Sysstat 4.0.7-3
Sysstat Sysstat 4.1.4
Sysstat Sysstat 4.1.5
Sysstat Sysstat 4.1.2
Sysstat Sysstat 4.1.3
Sysstat Sysstat 4.0.7
Sysstat Sysstat 4.1.1
Sysstat Sysstat 5.0.1
Sgi Propack 2.3
Sgi Propack 2.4
Sysstat Sysstat 4.1.6
Sysstat Sysstat 4.1.7
2.1
CVSSv2
CVE-2005-0156
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Larry Wall Perl 5.8.0
Sgi Propack 3.0
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.4.5
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.3
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Suse Suse Linux 9.0
Ubuntu Ubuntu Linux 4.1
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Ibm Aix 5.3
Suse Suse Linux 8.0
Ibm Aix 5.2
Trustix Secure Linux 1.5
1 EDB exploit
2.1
CVSSv2
CVE-2004-0231
Multiple vulnerabilities in Midnight Commander (mc) prior to 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.6
Sgi Propack 2.3
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Sgi Propack 2.4
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 0.7
Slackware Slackware Linux
Slackware Slackware Linux 9.0
2.1
CVSSv2
CVE-2004-0233
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Sgi Propack 2.4
Sgi Propack 3.0
Utempter Utempter 0.5.2
Utempter Utempter 0.5.3
Slackware Slackware Linux
Slackware Slackware Linux 9.1
1 EDB exploit
1.2
CVSSv2
CVE-2006-1167
SGI ProPack 3 SP6 kernel displays the frame buffer contents of the last session after a reboot, which might allow local users to obtain sensitive information.
Sgi Propack 3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6