Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2003 vulnerabilities and exploits
(subscribe to this query)
NA
CVE_2021_38647
CVE-2021-38647 AKA "OMIGOD" A Zeek package which detects CVE-2021-38647 AKA OMIGOD exploit attempts. https://corelight.com/blog/detecting-cve-2021-38647-omigod https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure https://msrc.microsoft.com/update-guide/v...
1 Github repository
9.8
CVSSv3
CVE-2021-29921
In Python prior to 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows malicious users to bypass access control that is based on IP addresses.
Python Python
Oracle Zfs Storage Appliance Kit 8.8
Oracle Graalvm 20.3.2
Oracle Graalvm 21.1.0
Oracle Communications Cloud Native Core Automated Test Suite 1.8.0
Oracle Communications Cloud Native Core Network Slice Selection Function 1.8.0
Oracle Communications Cloud Native Core Binding Support Function 1.11.0
1 Github repository
5.3
CVSSv3
CVE-2020-10136
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulatio...
Cisco Nx-os 5.2(1)sk3(1.1)
Cisco Nx-os 5.2(1)sk3(2.1)
Cisco Nx-os 5.2(1)sk3(2.1a)
Cisco Nx-os 5.2(1)sk3(2.2)
Cisco Nx-os 5.2(1)sk3(2.2b)
Cisco Nx-os 5.2(1)sm1(5.1)
Cisco Nx-os 5.2(1)sm1(5.2)
Cisco Nx-os 5.2(1)sm1(5.2a)
Cisco Nx-os 5.2(1)sm1(5.2b)
Cisco Nx-os 5.2(1)sm1(5.2c)
Cisco Nx-os 5.2(1)sm3(1.1)
Cisco Nx-os 5.2(1)sm3(1.1a)
Cisco Nx-os 5.2(1)sm3(1.1b)
Cisco Nx-os 5.2(1)sm3(1.1c)
Cisco Nx-os 5.2(1)sm3(2.1)
Cisco Nx-os 5.2(1)sv3(1.1)
Cisco Nx-os 5.2(1)sv3(1.2)
Cisco Nx-os 5.2(1)sv3(1.3)
Cisco Nx-os 5.2(1)sv3(1.4)
Cisco Nx-os 5.2(1)sv3(1.4b)
Cisco Nx-os 5.2(1)sv3(1.5a)
Cisco Nx-os 5.2(1)sv3(1.5b)
1 Article
6.6
CVSSv3
CVE-2017-11885
Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow a remote code execution vulnerability due to the way the Routing and Remot...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1511
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 8.1
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows 10 1703
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows Server 2016 1709
1 EDB exploit
1 Article
7.8
CVSSv3
CVE-2017-8461
Windows RPC with Routing and Remote Access enabled in Windows XP and Windows Server 2003 allows an malicious user to execute code on a targeted RPC server which has Routing and Remote Access enabled via a specially crafted application, aka "Windows RPC Remote Code Execution ...
Microsoft Windows Xp -
Microsoft Windows Server 2003 -
1 Github repository
NA
CVE-2015-2374
The Netlogon service in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2 does not properly implement domain-controller communication, which allows remote malicious users to discover credentials by leveraging cer...
Microsoft Windows 2003 Server R2
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008 R2
Microsoft Windows 2003 Server
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
1 Article
NA
CVE-2015-0096
Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan ...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Rt -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Vista -
Microsoft Windows 8 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2003 -
1 EDB exploit
1 Article
NA
CVE-2014-1819
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly control access to objects assoc...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Rt -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Vista -
Microsoft Windows 8 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2003 -
NA
CVE-2014-0318
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly control access to thread-owned ...
Microsoft Windows Server 2008 R2
Microsoft Windows Rt -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Vista -
Microsoft Windows 8 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2003 -
NA
CVE-2014-3802
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio prior to 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote malicious users to execute arbitrary code or ...
Microsoft Debug Interface Access Software Development Kit -
Microsoft Visual Studio 2002
Microsoft Visual Studio 2003
Microsoft Visual Studio 2005
Microsoft Visual Studio
Microsoft Visual Studio 2010
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »