Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ez-ipupdate vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0980
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 up to and including 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Angus Mackay Ez-ipupdate 3.0.11b5
Angus Mackay Ez-ipupdate 3.0.11b8
Debian Debian Linux 3.0
Gentoo Linux
2.1
CVSSv2
CVE-2003-0887
ez-ipupdate 3.0.11b7 and previous versions creates insecure temporary cache files, which allows local users to conduct unauthorized operations via a symlink attack on the ez-ipupdate.cache file.
Angus Mackay Ez-ipupdate 3.0.11b5
Angus Mackay Ez-ipupdate 3.0.11b7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started