Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm http server 5.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-5955
Unspecified vulnerability in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS allows remote malicious users to execute arbitrary commands via unknown vectors.
Ibm Http Server 5.3
Ibm Websphere Application Server -
1 Github repository
NA
CVE-2004-2762
The server in IBM Tivoli Storage Manager (TSM) 4.2.x on MVS, 5.1.9.x prior to 5.1.9.1, 5.1.x prior to 5.1.10, 5.2.2.x prior to 5.2.2.3, 5.2.x prior to 5.2.3, 5.3.x prior to 5.3.0, and 6.x prior to 6.1, when the HTTP communication method is enabled, allows remote malicious users t...
Ibm Tivoli Storage Manager 4.2
Ibm Tivoli Storage Manager 4.2.1
Ibm Tivoli Storage Manager 4.2.2
Ibm Tivoli Storage Manager 4.2.3
Ibm Tivoli Storage Manager 4.2.4
Ibm Tivoli Storage Manager 5.1.9
Ibm Tivoli Storage Manager 5.1.0
Ibm Tivoli Storage Manager 5.2.1
Ibm Tivoli Storage Manager 5.2.0
Ibm Tivoli Storage Manager 5.1.1
Ibm Tivoli Storage Manager 5.1.5
Ibm Tivoli Storage Manager 5.3
Ibm Tivoli Storage Manager 6.0
Ibm Tivoli Storage Manager 5.1.6
Ibm Tivoli Storage Manager 5.1.7
Ibm Tivoli Storage Manager 5.1.8
Ibm Tivoli Storage Manager 5.2.2
NA
CVE-1999-0097
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Hp Hp-ux 9.08
Sun Sunos 5.3
Hp Hp-ux 9.06
Hp Hp-ux 9.04
Ibm Aix 4.2.1
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Sun Solaris 2.4
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Hp Hp-ux 9.03
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Hp Hp-ux 10.24
Hp Hp-ux 11.00
Ibm Aix 4.1.1
Hp Hp-ux 9.05
Hp Hp-ux 9.09
Sun Sunos 5.4
8.8
CVSSv3
CVE-2019-8720
A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues.
Webkitgtk Webkitgtk
Wpewebkit Wpe Webkit
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux For Scientific Computing 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
Redhat Enterprise Linux For Power Big Endian 7.0
Redhat Enterprise Linux For Ibm Z Systems 7.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Update Services For Sap Solutions 8.4
Redhat Enterprise Linux For Power Little Endian 8.0
Redhat Enterprise Linux For Ibm Z Systems Eus 8.4
Redhat Enterprise Linux For Ibm Z Systems 8.0
Redhat Enterprise Linux For Power Little Endian Eus 8.4
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.4
Redhat Codeready Linux Builder 8.0
Redhat Codeready Linux Builder Eus 8.4
Redhat Codeready Linux Builder For Power Little Endian Eus 8.4
5.3
CVSSv3
CVE-2020-2781
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access...
Oracle Jdk 14.0.0
Oracle Jre 14.0.0
Oracle Jdk 11.0.6
Oracle Jre 11.0.6
Oracle Jdk 1.8.0
Oracle Jdk 1.7.0
Oracle Jre 1.8.0
Oracle Jre 1.7.0
Oracle Openjdk 8
Oracle Openjdk 7
Oracle Openjdk 14
Oracle Openjdk
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Opensuse Leap 15.1
Opensuse Leap 15.2
Fedoraproject Fedora 30
Fedoraproject Fedora 31
5.3
CVSSv3
CVE-2017-10349
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
Oracle Jdk 1.9.0
Oracle Jre 1.9.0
Oracle Jdk 1.8.0
Oracle Jdk 1.7.0
Oracle Jdk 1.6.0
Oracle Jre 1.6.0
Oracle Jre 1.8.0
Oracle Jre 1.7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Tus 7.4
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Satellite 5.8
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Eus 7.6
5.3
CVSSv3
CVE-2020-2830
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network...
Oracle Jre 1.7.0
Oracle Jre 1.8.0
Oracle Jdk 14.0.0
Oracle Jre 14.0.0
Oracle Jdk 11.0.6
Oracle Jre 11.0.6
Oracle Jdk 1.8.0
Oracle Jdk 1.7.0
Oracle Openjdk 8
Oracle Openjdk 7
Oracle Openjdk 14
Oracle Openjdk
Netapp Cloud Backup -
Netapp Steelstore Cloud Integrated Storage -
Netapp Snapmanager -
Netapp Oncommand Workflow Automation -
Netapp Storagegrid -
Netapp Storagegrid
Netapp Oncommand Insight -
Netapp Active Iq Unified Manager
Netapp E-series Santricity Os Controller
Netapp Santricity Unified Manager -
NA
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
4.8
CVSSv3
CVE-2020-2800
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacke...
Oracle Jre 1.7.0
Oracle Jre 1.8.0
Oracle Jdk 14.0.0
Oracle Jre 14.0.0
Oracle Jdk 11.0.6
Oracle Jre 11.0.6
Oracle Jdk 1.8.0
Oracle Jdk 1.7.0
Oracle Openjdk 8
Oracle Openjdk 7
Oracle Openjdk 14
Oracle Openjdk
Netapp Cloud Backup -
Netapp Steelstore Cloud Integrated Storage -
Netapp Snapmanager -
Netapp Oncommand Workflow Automation -
Netapp Storagegrid -
Netapp Storagegrid
Netapp Oncommand Insight -
Netapp Active Iq Unified Manager
Netapp Santricity Unified Manager -
Netapp E-series Performance Analyzer -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »