Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mandrakesoft mandrake linux 8.2 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2004-2394
Off-by-one error in passwd 0.68 and previous versions, when using the --stdin option, causes passwd to use the first 78 characters of a password instead of the first 79, which results in a small reduction of the search space required for brute force attacks.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 9.0
2.1
CVSSv2
CVE-2004-2395
Memory leak in passwd 0.68 allows local users to cause a denial of service (memory consumption) via a large number of failed read attempts from the password buffer.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux 9.0
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
2.1
CVSSv2
CVE-2002-1713
The Standard security setting for Mandrake-Security package (msec) in Mandrake 8.2 installs home directories with world-readable permissions, which could allow local users to read other user's files.
Mandrakesoft Mandrake Linux 8.2
10
CVSSv2
CVE-2003-0041
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
Mit Kerberos Ftp Client
Redhat Linux 7.0
Redhat Linux 7.2
Redhat Linux 6.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux 9.0
Mandrakesoft Mandrake Multi Network Firewall 8.2
6.2
CVSSv2
CVE-2002-0638
setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and previous versions, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an ...
Mandrakesoft Mandrake Single Network Firewall 7.2
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 8.0
Redhat Linux 6.0
Redhat Linux 7.0
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 8.1
Redhat Linux 6.1
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Redhat Linux 6.2
Redhat Linux 7.2
Redhat Linux 7.3
Hp Secure Os 1.0
Mandrakesoft Mandrake Linux 8.2
7.2
CVSSv2
CVE-2004-0834
Format string vulnerability in Speedtouch USB driver prior to 1.3.1 allows local users to execute arbitrary code via (1) modem_run, (2) pppoa2, or (3) pppoa3.
Speedtouch Speedtouch Usb Driver 1.1
Speedtouch Speedtouch Usb Driver 1.2 Beta3
Speedtouch Speedtouch Usb Driver 1.2 Beta2
Speedtouch Speedtouch Usb Driver 1.0
Speedtouch Speedtouch Usb Driver 1.3
Mandrakesoft Mandrake Multi Network Firewall 8.2
Speedtouch Speedtouch Usb Driver 1.2 Beta1
Speedtouch Speedtouch Usb Driver 1.2
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.1
Mandrakesoft Mandrake Linux 9.0
Gentoo Linux 1.4
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 10.0
7.5
CVSSv2
CVE-2002-0836
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote malicious users to execute arbitrary commands via certain print jobs, possibly involving fonts.
Mandrakesoft Mandrake Linux 8.0
Mandrakesoft Mandrake Linux 8.1
Redhat Linux 6.2
Redhat Linux 7.1
Redhat Linux 7.2
Hp Secure Os 1.0
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 8.2
Redhat Linux 7.0
Redhat Linux 8.0
Mandrakesoft Mandrake Linux 9.0
Redhat Linux 7.3
2.1
CVSSv2
CVE-2004-0565
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
Linux Linux Kernel 2.4.0
Trustix Secure Linux 2.1
2.1
CVSSv2
CVE-2004-0497
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Conectiva Linux 10
Redhat Enterprise Linux 2.1
Suse Suse Linux 8.2
Suse Suse Linux 9.0
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 9.1
Redhat Enterprise Linux 3.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 8.0
Suse Suse Linux 8.1
Gentoo Linux
Linux Linux Kernel 2.0
Suse Suse Linux 9.1
Trustix Secure Linux 2
1 EDB exploit
7.2
CVSSv2
CVE-2004-0496
Multiple unknown vulnerabilities in Linux kernel 2.6 allow local users to gain privileges or access kernel memory, a different set of vulnerabilities than those identified in CVE-2004-0495, as found by the Sparse source code checking tool.
Suse Suse Linux Office Server
Suse Suse Email Server 3.1
Suse Suse Linux Connectivity Server
Suse Suse Linux Database Server
Suse Suse Linux Firewall
Mandrakesoft Mandrake Multi Network Firewall 8.2
Suse Suse Email Server 3
Sun Sunos 5.8
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 9.1
Sun Sunos 5.9
Suse Suse Linux 7
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 8
Gentoo Linux
Linux Linux Kernel 2.6.0
Sun Solaris 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »