Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi propack 2.4 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2004-0506
The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote malicious users to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference.
Ethereal Group Ethereal 0.10.1
Sgi Propack 3.0
Ethereal Group Ethereal 0.10.2
Ethereal Group Ethereal 0.10.3
Sgi Propack 2.4
5
CVSSv2
CVE-2004-0417
Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x up to and including 1.12.8, and 1.11.x up to and including 1.11.16, may allow remote malicious users to cause a server crash, which could cause temporary data to remain undeleted...
Cvs Cvs 1.11.1
Cvs Cvs 1.11.1 P1
Cvs Cvs 1.11.3
Cvs Cvs 1.11.4
Openpkg Openpkg
Openpkg Openpkg 1.3
Cvs Cvs 1.10.7
Cvs Cvs 1.11.14
Cvs Cvs 1.11.15
Cvs Cvs 1.12.1
Cvs Cvs 1.12.2
Sgi Propack 3.0
Cvs Cvs 1.10.8
Cvs Cvs 1.11
Cvs Cvs 1.11.16
Cvs Cvs 1.11.2
Cvs Cvs 1.12.5
Cvs Cvs 1.12.7
Cvs Cvs 1.12.8
Cvs Cvs 1.11.10
Cvs Cvs 1.11.11
Cvs Cvs 1.11.5
5
CVSSv2
CVE-2004-0111
gdk-pixbuf prior to 0.20 allows malicious users to cause a denial of service (crash) via a malformed bitmap (BMP) file.
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.20
Sgi Propack 2.4
Redhat Gdk Pixbuf 0.18.0-7
Sgi Propack 2.3
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Linux Advanced Workstation 2.1
4.6
CVSSv2
CVE-2004-0107
The (1) post and (2) trigger scripts in sysstat 4.0.7 and previous versions allow local users to overwrite arbitrary files via symlink attacks on temporary files, a different vulnerability than CVE-2004-0108.
Sysstat Sysstat 4.0.7
Sysstat Sysstat 4.1.1
Sgi Propack 2.3
Sgi Propack 2.4
Sysstat Sysstat 4.1.7
Sysstat Sysstat 5.0.1
Redhat Sysstat 4.0.7-3
Sysstat Sysstat 4.1.5
Sysstat Sysstat 4.1.6
Sysstat Sysstat 4.1.2
Sysstat Sysstat 4.1.3
Sysstat Sysstat 4.1.4
4.6
CVSSv2
CVE-2004-0108
The isag utility, which processes sysstat data, allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CAN-2004-0107.
Redhat Sysstat 4.0.7-3
Sysstat Sysstat 4.1.4
Sysstat Sysstat 4.1.5
Sysstat Sysstat 4.1.2
Sysstat Sysstat 4.1.3
Sysstat Sysstat 4.0.7
Sysstat Sysstat 4.1.1
Sysstat Sysstat 5.0.1
Sgi Propack 2.3
Sgi Propack 2.4
Sysstat Sysstat 4.1.6
Sysstat Sysstat 4.1.7
2.1
CVSSv2
CVE-2004-0231
Multiple vulnerabilities in Midnight Commander (mc) prior to 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.6
Sgi Propack 2.3
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Sgi Propack 2.4
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 0.7
Slackware Slackware Linux
Slackware Slackware Linux 9.0
2.1
CVSSv2
CVE-2004-0233
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Sgi Propack 2.4
Sgi Propack 3.0
Utempter Utempter 0.5.2
Utempter Utempter 0.5.3
Slackware Slackware Linux
Slackware Slackware Linux 9.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3