Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rpm rpm vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2011-2644
Cross-site scripting (XSS) vulnerability in Kiwi prior to 3.74.2, as used in SUSE Studio 1.1 prior to 1.1.4, allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors, related to an RPM info display.
Marcus Schafer Kiwi
Novell Suse Studio Onsite 1.1
7.5
CVSSv2
CVE-2011-2645
Unspecified vulnerability in Kiwi prior to 3.74.2, as used in SUSE Studio 1.1 prior to 1.1.4, allows remote malicious users to execute arbitrary code via a crafted filename for a custom RPM.
Novell Suse Studio Onsite 1.1
Marcus Schafer Kiwi
5.8
CVSSv2
CVE-2010-2197
rpmbuild in RPM 4.8.0 and previous versions does not properly parse the syntax of spec files, which allows user-assisted remote malicious users to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.
Rpm Rpm 1.4.2
Rpm Rpm 1.3.1
Rpm Rpm 1.2
Rpm Rpm 2.0
Rpm Rpm 1.4.3
Rpm Rpm 1.4.4
Rpm Rpm 2.0.1
Rpm Rpm 2.0.2
Rpm Rpm 2.0.9
Rpm Rpm 2.0.10
Rpm Rpm 2.2.7
Rpm Rpm 2.2.8
Rpm Rpm 2.2
Rpm Rpm 2.3
Rpm Rpm 2.3.7
Rpm Rpm 2.3.8
Rpm Rpm 2.4.4
Rpm Rpm 2.4.5
Rpm Rpm 2.5.1
Rpm Rpm 2.5.2
Rpm Rpm 3.0.2
Rpm Rpm 3.0.3
7.2
CVSSv2
CVE-2010-2198
lib/fsm.c in RPM 4.8.0 and previous versions does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade or deletion of the file in an RPM package removal, which might allow local users to gain privileges or bypass intended ...
Rpm Rpm 2.3.5
Rpm Rpm 4.4.2.1
Rpm Rpm 1.4.3
Rpm Rpm 3.0.1
Rpm Rpm 4.1
Rpm Rpm 2.2.3.11
Rpm Rpm 2.4.4
Rpm Rpm 2.3.8
Rpm Rpm 2.0.6
Rpm Rpm 1.4.4
Rpm Rpm 4.4.2
Rpm Rpm 1.4.2\\/a
Rpm Rpm 2.4.1
Rpm Rpm 2.4.9
Rpm Rpm 2.6.7
Rpm Rpm 2..4.10
Rpm Rpm 1.4
Rpm Rpm 2.0.10
Rpm Rpm 2.4.5
Rpm Rpm 4.0.1
Rpm Rpm 2.2.11
Rpm Rpm 4.0.4
7.2
CVSSv2
CVE-2010-2199
lib/fsm.c in RPM 4.8.0 and previous versions does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade or deletion of the file in an RPM package removal, which might allow local users to bypass intended access restrictions...
Rpm Rpm 1.4.3
Rpm Rpm 1.4.4
Rpm Rpm 2.0
Rpm Rpm 2.0.1
Rpm Rpm 1.4.5
Rpm Rpm 1.4.6
Rpm Rpm 2.0.2
Rpm Rpm 2.0.3
Rpm Rpm 2.2.1
Rpm Rpm 2.2.2
Rpm Rpm 2.2.9
Rpm Rpm 2.2.11
Rpm Rpm 2.3
Rpm Rpm 2.3.1
Rpm Rpm 2.3.9
Rpm Rpm 2.2.3.10
Rpm Rpm 2.4.6
Rpm Rpm 2.6.7
Rpm Rpm 2.5.2
Rpm Rpm 2.5.3
Rpm Rpm 3.0.4
Rpm Rpm 3.0.5
7.2
CVSSv2
CVE-2010-2059
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM prior to 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link t...
Rpm Rpm 2.3.5
Rpm Rpm 4.4.2.1
Rpm Rpm 1.4.3
Rpm Rpm 3.0.1
Rpm Rpm 4.1
Rpm Rpm 2.2.3.11
Rpm Rpm 2.4.4
Rpm Rpm 2.3.8
Rpm Rpm 2.0.6
Rpm Rpm 1.4.4
Rpm Rpm 4.4.2
Rpm Rpm 1.4.2\\/a
Rpm Rpm 2.4.1
Rpm Rpm 2.4.9
Rpm Rpm 2.6.7
Rpm Rpm 2..4.10
Rpm Rpm 1.4
Rpm Rpm 2.0.10
Rpm Rpm 2.4.5
Rpm Rpm 4.0.1
Rpm Rpm 2.2.11
Rpm Rpm 4.0.4
7.2
CVSSv2
CVE-2005-4889
lib/fsm.c in RPM prior to 4.4.3 does not properly reset the metadata of an executable file during deletion of the file in an RPM package removal, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file, a related issu...
Rpm Rpm 1.4.5
Rpm Rpm 1.4.6
Rpm Rpm 2.0.2
Rpm Rpm 2.0.3
Rpm Rpm 2.0.4
Rpm Rpm 2.2.1
Rpm Rpm 2.2.2
Rpm Rpm 2.2.9
Rpm Rpm 2.2.11
Rpm Rpm 2.3.1
Rpm Rpm 2.3.2
Rpm Rpm 2.3.9
Rpm Rpm 2.2.3.10
Rpm Rpm 2.4.6
Rpm Rpm 1.4.2
Rpm Rpm 1.4.2\\/a
Rpm Rpm 1.3.1
Rpm Rpm 1.2
Rpm Rpm 2.0.7
Rpm Rpm 2.0.8
Rpm Rpm 2.2.5
Rpm Rpm 2.2.6
6.8
CVSSv2
CVE-2008-6846
Multiple stack-based buffer overflows in avast! Linux Home Edition 1.0.5, 1.0.5-1, and 1.0.8 allow remote malicious users to cause a denial of service (application crash) or execute arbitrary code via a malformed (1) ISO or (2) RPM file.
Avast Avast Antivirus 1.0.8
Avast Avast Antivirus 1.0.5
Avast Avast Antivirus 1.0.5-1
7.6
CVSSv2
CVE-2008-6085
Integer overflow in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, when configured to scan inside compressed archives, allows remote malicious users to execute arbitrary code via a crafted RPM compre...
F-secure F-secure Internet Security 2007
F-secure F-secure Internet Security 2006
F-secure F-secure Anti-virus For Workstations 7.10
F-secure F-secure Linux Security
F-secure F-secure Protection Service For Consumers 6.00
F-secure F-secure Protection Service For Consumers 5.00
F-secure F-secure Anti-virus Linux Server Security 5.30
F-secure F-secure Anti-virus 2007
F-secure F-secure Anti-virus 2006
F-secure F-secure Anti-virus Linux Client Security 5.52
F-secure F-secure Anti-virus Linux Client Security 5.30
F-secure F-secure Home Server Security 2009
F-secure F-secure Anti-virus For Windows Servers
F-secure F-secure Anti-virus For Microsoft Exchange 6.62
F-secure F-secure Internet Gatekeeper For Windows
F-secure F-secure Internet Gatekeeper For Linux
F-secure F-secure Anti-virus 7.02
F-secure F-secure Anti-virus 2009
F-secure F-secure Anti-virus Linux Client Security
F-secure F-secure Anti-virus Linux Client Security 5.53
F-secure F-secure Protection Service For Business
F-secure F-secure Protection Service For Business 3.00
10
CVSSv2
CVE-2008-0766
Stack-based buffer overflow in RpmSrvc.exe in Brooks Remote Print Manager (RPM) 4.5.1.11 and previous versions (Elite and Select) for Windows allows remote malicious users to execute arbitrary code via a long filename in a "Receive data file" LPD command. NOTE: some of ...
Brooks Internet Software Rpm Remote Print Manager Elite
Brooks Internet Software Rpm Remote Print Manager Select
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »