Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mageia mageia 4.0 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2014-9087
Integer underflow in the ksba_oid_to_str function in Libksba prior to 1.3.2, as used in GnuPG, allows remote malicious users to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
Mageia Mageia 3.0
Mageia Mageia 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Gnupg Libksba
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Gnupg Gnupg 2.1.0
668
VMScore
CVE-2013-4159
ctdb prior to 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, an...
Ctdb Project Ctdb 2.1
Opensuse Opensuse 12.3
Ctdb Project Ctdb
Ctdb Project Ctdb 2.0
Opensuse Opensuse 13.1
Mageia Mageia 3.0
Mageia Mageia 4.0
632
VMScore
CVE-2014-9637
GNU patch 2.7.2 and previous versions allows remote malicious users to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Mageia Mageia 4.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Gnu Patch
605
VMScore
CVE-2015-2296
The resolve_redirects function in sessions.py in requests 2.1.0 up to and including 2.5.3 allows remote malicious users to conduct session fixation attacks via a cookie without a host value in a redirect.
Mageia Project Mageia 4.0
Python Requests 2.4.2
Python Requests 2.4.3
Python Requests 2.5.0
Python Requests 2.5.1
Python Requests 2.1.0
Python Requests 2.3.0
Python Requests 2.4.0
Python Requests 2.4.1
Python Requests 2.5.2
Python Requests 2.5.3
Python Requests 2.2.1
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
605
VMScore
CVE-2014-8104
OpenVPN 2.x prior to 2.0.11, 2.1.x, 2.2.x prior to 2.2.3, and 2.3.x prior to 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
Mageia Mageia 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Openvpn Openvpn 2.0 Rc9
Openvpn Openvpn 2.1
Openvpn Openvpn 2.0 Test19
Openvpn Openvpn 2.0 Test17
Openvpn Openvpn 2.0 Test28
Openvpn Openvpn 2.0 Test10
Openvpn Openvpn 2.2
Openvpn Openvpn 2.0 Test23
Openvpn Openvpn 2.2.2
Openvpn Openvpn 2.3
Openvpn Openvpn 2.0.1 Rc3
Openvpn Openvpn 2.0 Rc19
Openvpn Openvpn 2.2.1
Openvpn Openvpn 2.0.4
Openvpn Openvpn 2.0 Rc21
Openvpn Openvpn 2.3.4
1 Article
605
VMScore
CVE-2014-9037
WordPress prior to 3.7.5, 3.8.x prior to 3.8.5, 3.9.x prior to 3.9.3, and 4.x prior to 4.0.1 might allow remote malicious users to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
Mageia Project Mageia 4
Mageia Project Mageia 3
Wordpress Wordpress 3.8.3
Wordpress Wordpress 3.9.2
Wordpress Wordpress 3.8.2
Wordpress Wordpress 4.0
Wordpress Wordpress 3.8
Wordpress Wordpress 3.8.1
Wordpress Wordpress 3.9.1
Wordpress Wordpress 3.8.4
Wordpress Wordpress
Wordpress Wordpress 3.9
Debian Debian Linux 8.0
Debian Debian Linux 7.0
605
VMScore
CVE-2014-3429
IPython Notebook 0.12 up to and including 1.x prior to 1.2 does not validate the origin of websocket requests, which allows remote malicious users to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Ipython Ipython Notebook 0.13.1
Ipython Ipython Notebook 0.13.2
Ipython Ipython Notebook 0.13
Ipython Ipython Notebook 0.12
Ipython Ipython Notebook 1.0.0
Ipython Ipython Notebook 1.1.0
Ipython Ipython Notebook 0.12.1
Mageia Mageia 3.0
Mageia Mageia 4.0
445
VMScore
CVE-2014-9116
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote malicious users to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt...
Suse Linux Enterprise Desktop 12
Suse Suse Linux Enterprise Server 12
Mutt Mutt 1.5.23
Debian Debian Linux 7.0
Mageia Mageia 4.0
445
VMScore
CVE-2014-8763
DokuWiki prior to 2014-05-05b, when using Active Directory for LDAP authentication, allows remote malicious users to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.
Dokuwiki Dokuwiki
Mageia Project Mageia 3.0
Mageia Project Mageia 4.0
445
VMScore
CVE-2014-8764
DokuWiki 2014-05-05a and previous versions, when using Active Directory for LDAP authentication, allows remote malicious users to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind.
Mageia Project Mageia 3.0
Mageia Project Mageia 4.0
Dokuwiki Dokuwiki
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »