Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2005-1523
Format string vulnerability in imap4d server in GNU Mailutils 0.5 and 0.6, and other versions prior to 0.6.90, allows remote malicious users to execute arbitrary code via format string specifiers in the command tag for IMAP commands.
Gnu Mailutils 0.5
Gnu Mailutils 0.6
1 EDB exploit
755
VMScore
CVE-2002-1374
The COM_CHANGE_USER command in MySQL 3.x prior to 3.23.54, and 4.x prior to 4.0.6, allows remote malicious users to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the...
Oracle Mysql 3.22.32
Oracle Mysql 3.23.10
Oracle Mysql 3.23.29
Oracle Mysql 3.23.3
Oracle Mysql 3.23.39
Oracle Mysql 3.23.4
Oracle Mysql 3.23.46
Oracle Mysql 3.23.47
Oracle Mysql 3.23.53a
Oracle Mysql 3.23.8
Symantec Veritas Netbackup Advanced Reporter 3.4
Symantec Veritas Netbackup Advanced Reporter 4.5
Symantec Veritas Netbackup Global Data Manager 4.5
Symantec Veritas Netbackup Global Data Manager 4.5 Fp1
Oracle Mysql 3.22.26
Oracle Mysql 3.23.2
Oracle Mysql 3.23.23
Oracle Mysql 3.23.30
Oracle Mysql 3.23.31
Oracle Mysql 3.23.40
Oracle Mysql 3.23.41
Oracle Mysql 3.23.48
1 EDB exploit
755
VMScore
CVE-2002-1375
The COM_CHANGE_USER command in MySQL 3.x prior to 3.23.54, and 4.x to 4.0.6, allows remote malicious users to execute arbitrary code via a long response.
Oracle Mysql 3.22.27
Oracle Mysql 3.22.28
Oracle Mysql 3.23.24
Oracle Mysql 3.23.25
Oracle Mysql 3.23.31
Oracle Mysql 3.23.34
Oracle Mysql 3.23.36
Oracle Mysql 3.23.42
Oracle Mysql 3.23.43
Oracle Mysql 3.23.5
Oracle Mysql 3.23.50
Oracle Mysql 4.0.1
Oracle Mysql 4.0.2
Symantec Veritas Netbackup Advanced Reporter 4.5 Fp3
Symantec Veritas Netbackup Advanced Reporter 4.5 Mp1
Symantec Veritas Netbackup Global Data Manager 4.5 Mp1
Symantec Veritas Netbackup Global Data Manager 4.5 Mp2
Oracle Mysql 3.22.29
Oracle Mysql 3.22.30
Oracle Mysql 3.23.26
Oracle Mysql 3.23.27
Oracle Mysql 3.23.37
1 EDB exploit
1 Github repository
755
VMScore
CVE-2002-0388
Cross-site scripting vulnerabilities in Mailman prior to 2.0.11 allow remote malicious users to execute script via (1) the admin login page, or (2) the Pipermail index summaries.
Gnu Mailman
1 EDB exploit
755
VMScore
CVE-2001-0775
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote malicious users to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Xli Xli 1.16
Xli Xli 1.17
Xloadimage Xloadimage 4.1
1 EDB exploit
755
VMScore
CVE-2001-0700
Buffer overflow in w3m 0.2.1 and previous versions allows a remote malicious user to execute arbitrary code via a long base64 encoded MIME header.
W3m W3m 0.1.8
W3m W3m 0.1.9
W3m W3m 0.1.10
W3m W3m 0.2
W3m W3m
W3m W3m 0.1.3
W3m W3m 0.1.4
W3m W3m 0.1.6
W3m W3m 0.1.7
1 EDB exploit
755
VMScore
CVE-2001-0522
Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and previous versions can allow an malicious user to gain privileges via format strings in the original filename that is stored in an encrypted file.
Gnu Privacy Guard 7.1
Gnu Privacy Guard 7.2
Gnu Privacy Guard 8.0
1 EDB exploit
755
VMScore
CVE-2001-0596
Netscape Communicator prior to 4.77 allows remote malicious users to execute arbitrary Javascript via a GIF image whose comment contains the Javascript.
Netscape Communicator
1 EDB exploit
755
VMScore
CVE-2001-1022
Format string vulnerability in pic utility in groff 1.16.1 and other versions, and jgroff prior to 1.15, allows remote malicious users to bypass the -S option and execute arbitrary commands via format string specifiers in the plot command.
Gnu Groff 1.14
Gnu Groff 1.15
Gnu Groff 1.16.1
Jgroff Jgroff
Gnu Groff 1.11
Gnu Groff 1.11a
Gnu Groff 1.10
1 EDB exploit
755
VMScore
CVE-1999-0997
wu-ftp with FTP conversion enabled allows an malicious user to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
Millenux Gmbh Anonftp 2.8.1
University Of Washington Wu-ftpd 2.5.0
University Of Washington Wu-ftpd 2.6.0
University Of Washington Wu-ftpd 2.4.2
Redhat Linux 6.1
Redhat Linux 5.2
Redhat Linux 6.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »