Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trustix secure linux 2.0 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2004-1065
Buffer overflow in the exif_read_data function in PHP prior to 4.3.10 and PHP 5.x up to 5.0.2 allows remote malicious users to execute arbitrary code via a long section name in an image file.
Openpkg Openpkg 2.1
Php Php 3.0.12
Php Php 3.0.13
Php Php 3.0
Php Php 3.0.1
Php Php 3.0.16
Php Php 3.0.17
Php Php 3.0.8
Php Php 3.0.9
Php Php 4.0.3
Php Php 4.0.4
Php Php 4.1.0
Php Php 4.1.1
Php Php 4.3.1
Php Php 4.3.2
Php Php 4.3.9
Php Php 5.0.0
Php Php 3.0.4
Php Php 3.0.5
Php Php 4.0.1
Php Php 4.0.7
Php Php 4.2.2
755
VMScore
CVE-2004-2044
PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote mali...
Francisco Burzi Php-nuke 5.3.1
Francisco Burzi Php-nuke 5.4
Francisco Burzi Php-nuke 6.5 Rc2
Francisco Burzi Php-nuke 6.5 Rc3
Francisco Burzi Php-nuke 7.2
Francisco Burzi Php-nuke 7.3
Francisco Burzi Php-nuke 5.0
Francisco Burzi Php-nuke 5.5
Francisco Burzi Php-nuke 5.6
Francisco Burzi Php-nuke 6.6
Francisco Burzi Php-nuke 6.7
Oscommerce Osc2nuke 7x 1.0
Paul Laudanski Betanc Php-nuke Bundle
Francisco Burzi Php-nuke 5.0.1
Francisco Burzi Php-nuke 5.1
Francisco Burzi Php-nuke 6.0
Francisco Burzi Php-nuke 6.5
Francisco Burzi Php-nuke 6.9
Francisco Burzi Php-nuke 7.0
Francisco Burzi Php-nuke 5.2
Francisco Burzi Php-nuke 5.2a
Francisco Burzi Php-nuke 6.5 Beta1
1 EDB exploit
1000
VMScore
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
445
VMScore
CVE-2004-0886
Multiple integer overflows in libtiff 3.6.1 and previous versions allow remote malicious users to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.4
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.5
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 3.0
668
VMScore
CVE-2004-0803
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and previous versions, related to buffer overflows and integer overflows, allow remote malicious users to execute arbitrary code via TIFF files.
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.6
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.6
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
605
VMScore
CVE-2004-0957
Unknown vulnerability in MySQL 3.23.58 and previous versions, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activitie...
Oracle Mysql 3.21
Oracle Mysql 3.22
Oracle Mysql 3.23
Oracle Mysql 3.23.10
Oracle Mysql 3.23.27
Oracle Mysql 3.23.28
Oracle Mysql 3.23.34
Oracle Mysql 3.23.36
Oracle Mysql 3.23.42
Oracle Mysql 3.23.43
Oracle Mysql 3.23.5
Oracle Mysql 3.23.50
Oracle Mysql 3.23.56
Oracle Mysql 3.23.58
Oracle Mysql 4.0.11
Oracle Mysql 4.0.20
Oracle Mysql 4.0.3
Oracle Mysql 3.22.28
Oracle Mysql 3.22.29
Oracle Mysql 3.23.23
Oracle Mysql 3.23.24
Oracle Mysql 3.23.3
409
VMScore
CVE-2004-0685
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.15 Pre20
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5