Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-0599
The init_request_info function in sapi/cgi/cgi_main.c in PHP prior to 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote malicious users to execute arbitrary code via a crafted URI.
Php Php
Fedoraproject Fedora 9
Fedoraproject Fedora 8
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Apple Mac Os X Server
Apple Mac Os X
10
CVSSv2
CVE-2007-0061
The DHCP server in EMC VMware Workstation prior to 5.5.5 Build 56455 and 6.x prior to 6.0.1 Build 55017, Player prior to 1.0.5 Build 56455 and Player 2 prior to 2.0.1 Build 55017, ACE prior to 1.0.3 Build 54075 and ACE 2 prior to 2.0.1 Build 55017, and Server prior to 1.0.4 Build...
Vmware Ace
Vmware Esx 2.0.2
Vmware Esx 2.5.3
Vmware Player
Vmware Server
Vmware Workstation
Vmware Esx 2.5.4
Vmware Esx 3.0.0
Vmware Esx 3.0.1
Vmware Esx 2.1.3
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 7.04
10
CVSSv2
CVE-2007-0063
Integer underflow in the DHCP server in EMC VMware Workstation prior to 5.5.5 Build 56455 and 6.x prior to 6.0.1 Build 55017, Player prior to 1.0.5 Build 56455 and Player 2 prior to 2.0.1 Build 55017, ACE prior to 1.0.3 Build 54075 and ACE 2 prior to 2.0.1 Build 55017, and Server...
Vmware Player
Vmware Workstation
Vmware Esx 3.0.1
Vmware Esx 2.0.2
Vmware Esx 2.1.3
Vmware Esx 2.5.3
Vmware Esx 2.5.4
Vmware Ace
Vmware Server
Vmware Esx 3.0.0
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
10
CVSSv2
CVE-2007-2442
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and previous versions might allow remote malicious users to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
Mit Kerberos 5
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
10
CVSSv2
CVE-2007-0956
The telnet daemon (telnetd) in MIT krb5 prior to 1.6.1 allows remote malicious users to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
Mit Kerberos 5
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
10
CVSSv2
CVE-2005-2700
ssl_engine_kernel.c in mod_ssl prior to 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote malicious users to bypass intende...
Apache Http Server
Debian Debian Linux 3.1
Debian Debian Linux 3.0
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
10
CVSSv2
CVE-2004-1018
Multiple integer handling errors in PHP prior to 4.3.10 allow malicious users to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an "integer overflow/underflow" in the p...
Php Php
Canonical Ubuntu Linux 4.10
2 EDB exploits
10
CVSSv2
CVE-2004-1063
PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name...
Php Php
Canonical Ubuntu Linux 4.10
10
CVSSv2
CVE-2004-1064
The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow malicious users to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision ...
Php Php
Canonical Ubuntu Linux 4.10
9.4
CVSSv2
CVE-2019-15926
An issue exists in the Linux kernel prior to 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
Linux Linux Kernel
Debian Debian Linux 8.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »