Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ntop ntop - vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2009-2732
The checkHTTPpassword function in http.c in ntop 3.3.10 and previous versions allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an Authorization HTTP header that lacks a : (colon) character in the base64-decoded string.
Ntop Ntop
1 EDB exploit
435
VMScore
CVE-2014-5464
Cross-site scripting (XSS) vulnerability in the nDPI traffic classification library in ntopng (aka ntop) prior to 1.2.1 allows remote malicious users to inject arbitrary web script or HTML via the HTTP Host header.
Ntop Ntopng 1.1
Ntop Ntopng
1 EDB exploit
1000
VMScore
CVE-2000-0706
Buffer overflows in ntop running in web mode allows remote malicious users to execute arbitrary commands.
Luca Deri Ntop 1.2a7 9
Luca Deri Ntop 1.3.1
1 EDB exploit
383
VMScore
CVE-2014-4165
Cross-site scripting (XSS) vulnerability in ntop allows remote malicious users to inject arbitrary web script or HTML via the title parameter in a list action to plugins/rrdPlugin.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Ntop Ntop -
605
VMScore
CVE-2015-8368
ntopng (aka ntop) prior to 2.2 allows remote authenticated users to change the login context and gain privileges via the user cookie and username parameter to admin/password_reset.lua.
Ntop Ntopng
1 EDB exploit
383
VMScore
CVE-2017-7416
ntopng prior to 3.0 allows XSS because GET and POST parameters are improperly validated.
Ntop Ntopng
445
VMScore
CVE-2017-7458
The NetworkInterface::getHost function in NetworkInterface.cpp in ntopng prior to 3.0 allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via an empty field that should have contained a hostname or IP address.
Ntop Ntopng
445
VMScore
CVE-2017-7459
ntopng prior to 3.0 allows HTTP Response Splitting.
Ntop Ntopng
445
VMScore
CVE-2020-11940
In nDPI up to and including 3.2 Stable, an out-of-bounds read in concat_hash_string in ssh.c can be exploited by a network-positioned attacker that can send malformed SSH protocol messages on a network segment monitored by nDPI's library.
Ntop Ndpi
570
VMScore
CVE-2020-15471
In nDPI up to and including 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
Ntop Ndpi
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »