Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 6.10 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2007-2728
The soap extension in PHP calls php_rand_r with an uninitialized seed variable, which has unknown impact and attack vectors, a related issue to the mcrypt_create_iv issue covered by CVE-2007-2727.
Php Php -
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 7.04
5
CVSSv2
CVE-2007-1349
PerlRun.pm in Apache mod_perl prior to 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote malicious users to cause a denial of service (resource consumption) via a crafted URI.
Apache Mod Perl
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 7.04
Redhat Satellite 5.1
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 4.5
Redhat Enterprise Linux Server 3.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 5.0
5
CVSSv2
CVE-2007-0908
The WDDX deserializer in the wddx extension in PHP 5 prior to 5.2.1 and PHP 4 prior to 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent malicious users to read stack memory via a wddxPacket element that contains a vari...
Php Php 4.0
Php Php
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
1 EDB exploit
5
CVSSv2
CVE-2006-5779
OpenLDAP prior to 2.3.29 allows remote malicious users to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
Openldap Openldap
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
4.9
CVSSv2
CVE-2007-2691
MySQL prior to 4.1.23, 5.0.x prior to 5.0.42, and 5.1.x prior to 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
Mysql Mysql
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
4.7
CVSSv2
CVE-2007-3304
Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUS...
Apache Http Server
Fedoraproject Fedora 7
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
4.7
CVSSv2
CVE-2007-2172
A typo in Linux kernel 2.6 prior to 2.6.21-rc6 and 2.4 prior to 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
Linux Linux Kernel 2.6.21
Linux Linux Kernel
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
4.4
CVSSv2
CVE-2009-4135
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 up to and including 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Coreutils 6.6
Gnu Coreutils 6.10
Gnu Coreutils 5.96
Gnu Coreutils 5.91
Gnu Coreutils 6.4
Gnu Coreutils 6.12
Gnu Coreutils 5.2.1
Gnu Coreutils 7.6
Gnu Coreutils 6.8
Gnu Coreutils 6.7
Gnu Coreutils 8.1
Gnu Coreutils 7.1
Gnu Coreutils 6.11
Gnu Coreutils 7.3
Gnu Coreutils 7.4
Gnu Coreutils 5.97
Gnu Coreutils 5.94
Gnu Coreutils 5.93
Gnu Coreutils 6.5
4.3
CVSSv2
CVE-2008-0063
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote malicious users to obtain sensitive information, aka "Uninitialized stack values."
Mit Kerberos 5
Apple Mac Os X
Apple Mac Os X Server
Opensuse Opensuse 10.2
Opensuse Opensuse 10.3
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Server 10
Suse Linux Enterprise Desktop 10
Suse Linux 10.1
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 8
Fedoraproject Fedora 7
4.3
CVSSv2
CVE-2008-0005
mod_proxy_ftp in Apache 2.2.x prior to 2.2.7-dev, 2.0.x prior to 2.0.62-dev, and 1.3.x prior to 1.3.40-dev does not define a charset, which allows remote malicious users to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
Apache Http Server
Fedoraproject Fedora 8
Fedoraproject Fedora 7
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »