Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
maxx vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv2
CVE-2019-13208
WavesSysSvc in Waves MAXX Audio allows privilege escalation because the General registry key has Full Control access for the Users group, leading to DLL side loading. This affects WavesSysSvc64.exe 1.9.29.0.
Maxx Waves Maxx Audio 1.9.29.0
7.2
CVSSv2
CVE-2019-15084
Realtek Waves MaxxAudio driver 1.6.2.0, as used on Dell laptops, installs with incorrect file permissions. As a result, a local attacker can escalate to SYSTEM.
Maxx Waves Maxx Audio 1.6.2.0
10
CVSSv2
CVE-2012-4702
360 Systems Maxx, Image Server Maxx, and Image Server 2000 have a hardcoded password for the root account, which makes it easier for remote malicious users to execute arbitrary code, or modify video content or scheduling, via an SSH session.
360systems Maxx -
360systems Image Server 2000 -
360systems Image Server Maxx -
7.2
CVSSv2
CVE-2001-0279
Buffer overflow in sudo earlier than 1.6.3p6 allows local users to gain root privileges.
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Debian Debian Linux 2.2
1 EDB exploit
7.2
CVSSv2
CVE-2002-0184
Sudo prior to 1.6.6 contains an off-by-one error that can result in a heap-based buffer overflow that may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded.
Sudo Project Sudo
Debian Debian Linux 2.2
1 EDB exploit
10
CVSSv2
CVE-2000-0343
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote malicious users to execute arbitrary commands via a long MAIL FROM mail header.
Brecht Claerhout Sniffit 0.3.7beta
Brecht Claerhout Sniffit 0.3.6hip
3 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4040
cross-site scripting
CVE-2023-25790
CVE-2024-2961
XML external entity
CVE-2024-26926
CVE-2024-32806
CVE-2024-32711
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started