Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openpkg openpkg 1.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0413
libsvn_ra_svn in Subversion 1.0.4 trusts the length field of (1) svn://, (2) svn+ssh://, and (3) other svn protocol URL strings, which allows remote malicious users to cause a denial of service (memory consumption) and possibly execute arbitrary code via an integer overflow that ...
Subversion Subversion 1.0.4
Subversion Subversion 1.0
Subversion Subversion 1.0.1
Openpkg Openpkg
Openpkg Openpkg 2.0
Subversion Subversion 1.0.2
Subversion Subversion 1.0.3
4.6
CVSSv2
CVE-2004-1997
Kolab stores OpenLDAP passwords in plaintext in the slapd.conf file, which may be installed world-readable, which allows local users to gain privileges.
Kolab Kolab Groupware Server 1.0.7
Kolab Kolab Groupware Server 1.0.8
Kolab Kolab Groupware Server 1.0.5
Kolab Kolab Groupware Server 1.0.6
Kolab Kolab Groupware Server 1.0
Openpkg Openpkg 2.0
Kolab Kolab Groupware Server 1.0.1
Kolab Kolab Groupware Server 1.0.3
7.5
CVSSv2
CVE-2007-5116
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent malicious users to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Openpkg Openpkg Current
Redhat Enterprise Linux 1.0
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.6
Mandrakesoft Mandrake Multi Network Firewall 2.0
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
10
CVSSv2
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
7.5
CVSSv2
CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote malicious users to execute arbitrary code.
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.17
Conectiva Linux 9.0
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.13
Cyrus Sasl 2.1.9
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.11
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.14
Cyrus Sasl 2.1.15
Suse Suse Cvsup 16.1h 36.i586
Conectiva Linux 10.0
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-17519
open redirect
CVE-2024-21683
cache poisoning
CVE-2021-47524
CVE-2021-47521
CVE-2024-5229
CVE-2021-47560
local
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started