Filter
AND

Oracle WebLogic ServerBEA WebLogic Express and WebLogic Server 7.0 and 7.0.0.1, stores passwords in plaintext when a keyst…

2.1
First published (updated )

Red Hat LinuxOS Command Injection

First published (updated )

Red Hat LinuxBuffer Overflow

First published (updated )

SGI IRIXThe Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an…

First published (updated )

Debian GNU/LinuxMemory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat Linuxdvips converter for Postscript files in the tetex package calls the system() function insecurely, wh…

7.5
First published (updated )

Red Hat LinuxRace Condition

First published (updated )

Red Hat LinuxBuffer Overflow

7.2
First published (updated )

Red Hat Linuxrsync, when running in daemon mode, does not properly call setgroups before dropping privileges, whi…

2.1
First published (updated )

Red Hat LinuxMemory leak in SNMP in Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of se…

2.6
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat LinuxSquid 2.4 STABLE3 and earlier does not properly disable HTCP, even when "htcp_port 0" is specified i…

7.5
First published (updated )

Red Hat LinuxSquid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and p…

7.5
First published (updated )

SUSE LinuxHeap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a…

7.2
First published (updated )

Red Hat LinuxGNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user …

3.6
First published (updated )

Red Hat LinuxBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ImmunixVulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local user…

2.1
First published (updated )

SUSE LinuxBuffer Overflow

First published (updated )

Red Hat LinuxThe default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not …

7.5
First published (updated )

OpenLDAPslapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial…

First published (updated )

Mandrake LinuxFormat string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute ar…

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat LinuxBuffer Overflow

7.2
First published (updated )

Mandrake LinuxBuffer Overflow

7.5
First published (updated )

Red Hat Linuxinetd in Red Hat 6.2 does not properly close sockets for internal services such as chargen, daytime,…

First published (updated )

Red Hat LinuxBuffer Overflow

First published (updated )

Red Hat LinuxFormat string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attacker…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat LinuxWhen using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify…

2.1
First published (updated )

Conectiva LinuxZope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified…

7.2
First published (updated )

Red Hat LinuxBuffer Overflow

7.2
First published (updated )

Conectiva LinuxMultiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, …

7.2
First published (updated )

Red Hat Linuxrestore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environment…

7.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203