Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mandragore vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0069
Format string vulnerability in HD Soft Windows FTP Server 1.6 and previous versions allows remote malicious users to execute arbitrary code via format string specifiers in the username, which is processed by the wscanf function.
Hd Soft Windows Ftp Server
1 EDB exploit
NA
CVE-2005-0419
Multiple heap-based buffer overflows in 3Com 3CServer allow remote authenticated users to execute arbitrary code via long FTP commands, as demonstrated using the STAT command.
3com 3cserver 1.1
1 EDB exploit
NA
CVE-2004-1373
Format string vulnerability in SHOUTcast 1.9.4 allows remote malicious users to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.
Nullsoft Shoutcast Server 1.9.4
3 EDB exploits
NA
CVE-2004-0636
Buffer overflow in the goaway function in the aim:goaway URI handler for AOL Instant Messenger (AIM) 5.5, including 5.5.3595, allows remote malicious users to execute arbitrary code via a long Away message.
Aol Instant Messenger 5.5
Aol Instant Messenger 5.5.3415 Beta
Aol Instant Messenger 5.5.3595
3 EDB exploits
NA
CVE-2004-2111
Stack-based buffer overflow in the site chmod command in Serv-U FTP Server prior to 4.2 allows remote malicious users to execute arbitrary code via a long filename.
Solarwinds Serv-u File Server 4.0.0.4
Solarwinds Serv-u File Server 3.0.0.17
Solarwinds Serv-u File Server 4.1.0.0
Solarwinds Serv-u File Server
Solarwinds Serv-u File Server 3.1.0.3
Solarwinds Serv-u File Server 3.0.0.16
Solarwinds Serv-u File Server 3.1.0.0
Solarwinds Serv-u File Server 3.1.0.1
5 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started