Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
server core vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2021-26423
.NET Core and Visual Studio Denial of Service Vulnerability
Microsoft Visual Studio 2017
Microsoft Visual Studio 2019
Microsoft Visual Studio 2019 8.10
Microsoft .net
Microsoft .net Core
Microsoft Powershell Core
10
CVSSv2
CVE-2016-1580
The setup_snappy_os_mounts function in the ubuntu-core-launcher package prior to 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote malicious users to obtain sensitive information or gain privileges via a snap with a name star...
Canonical Ubuntu-core-launcher 1.0.27
NA
CVE-2023-24023
Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 up to and including 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injecti...
Bluetooth Bluetooth Core Specification
Microsoft Windows 10 22h2
Microsoft Windows 11 21h2
Microsoft Windows 11 22h2
Microsoft Windows 11 23h2
Microsoft Windows Server 2022 23h2
Microsoft Windows 10 21h2
Microsoft Windows 10 1809
Microsoft Windows Server 2019
Microsoft Windows Server 2022
1 Github repository
1 Article
4.4
CVSSv2
CVE-2021-37159
hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel up to and including 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.
Linux Linux Kernel
Debian Debian Linux 9.0
Oracle Communications Cloud Native Core Binding Support Function 22.1.3
Oracle Communications Cloud Native Core Policy 22.2.0
Oracle Communications Cloud Native Core Network Exposure Function 22.1.1
5
CVSSv2
CVE-2007-3847
The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
Apache Http Server
Fedoraproject Fedora 7
Fedoraproject Fedora Core 6
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
6.8
CVSSv2
CVE-2021-22901
curl 7.75.0 up to and including 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote c...
Haxx Curl
Oracle Mysql Server
Oracle Essbase
Oracle Communications Cloud Native Core Network Slice Selection Function 1.8.0
Oracle Communications Cloud Native Core Network Repository Function 1.15.0
Oracle Communications Cloud Native Core Network Function Cloud Native Environment 1.10.0
Oracle Communications Cloud Native Core Service Communication Proxy 1.15.0
Oracle Communications Cloud Native Core Network Repository Function 1.15.1
Oracle Communications Cloud Native Core Binding Support Function 1.11.0
Netapp Cloud Backup -
Netapp Snapcenter -
Netapp Oncommand Workflow Automation -
Netapp Oncommand Insight -
Netapp Solidfire \\& Hci Management Node -
Netapp Active Iq Unified Manager -
Netapp Solidfire Baseboard Management Controller Firmware -
Netapp Solidfire\\, Enterprise Sds \\& Hci Storage Node -
Netapp Hci Compute Node Firmware -
Netapp H300e Firmware -
Netapp H300s Firmware -
Netapp H410s Firmware -
Netapp H500e Firmware -
5
CVSSv2
CVE-2020-11612
The ZlibDecoders in Netty 4.1.x prior to 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.
Netty Netty
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 33
Netapp Oncommand Workflow Automation -
Netapp Oncommand Insight -
Netapp Oncommand Api Services -
Oracle Webcenter Portal 12.2.1.3.0
Oracle Webcenter Portal 12.2.1.4.0
Oracle Nosql Database
Oracle Communications Messaging Server 8.1
Oracle Communications Design Studio 7.4.2
Oracle Communications Brm - Elastic Charging Engine 12.0.0.3
Oracle Communications Cloud Native Core Service Communication Proxy 1.5.2
Oracle Siebel Core - Server Framework
10
CVSSv2
CVE-2004-1011
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 up to and including 2.2.8, with the imapmagicplus option enabled, allows remote malicious users to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
Carnegie Mellon University Cyrus Imap Server 2.1.7
Carnegie Mellon University Cyrus Imap Server 2.1.9
Carnegie Mellon University Cyrus Imap Server 2.2.6
Carnegie Mellon University Cyrus Imap Server 2.2.7
Carnegie Mellon University Cyrus Imap Server 2.2.8
Carnegie Mellon University Cyrus Imap Server 2.1.10
Carnegie Mellon University Cyrus Imap Server 2.1.16
Carnegie Mellon University Cyrus Imap Server 2.2.4
Carnegie Mellon University Cyrus Imap Server 2.2.5
Carnegie Mellon University Cyrus Imap Server 2.2.2 Beta
Carnegie Mellon University Cyrus Imap Server 2.2.3
Conectiva Linux 9.0
Carnegie Mellon University Cyrus Imap Server 2.2.0 Alpha
Carnegie Mellon University Cyrus Imap Server 2.2.1 Beta
Openpkg Openpkg Current
Conectiva Linux 10.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Redhat Fedora Core Core 2.0
Redhat Fedora Core Core 3.0
Ubuntu Ubuntu Linux 4.1
Trustix Secure Linux 2.2
10
CVSSv2
CVE-2004-1012
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and previous versions allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index in...
Carnegie Mellon University Cyrus Imap Server 2.1.7
Carnegie Mellon University Cyrus Imap Server 2.1.9
Carnegie Mellon University Cyrus Imap Server 2.2.7
Carnegie Mellon University Cyrus Imap Server 2.2.8
Carnegie Mellon University Cyrus Imap Server 2.1.10
Carnegie Mellon University Cyrus Imap Server 2.1.16
Carnegie Mellon University Cyrus Imap Server 2.2.4
Carnegie Mellon University Cyrus Imap Server 2.2.5
Carnegie Mellon University Cyrus Imap Server 2.2.6
Carnegie Mellon University Cyrus Imap Server 2.2.2 Beta
Carnegie Mellon University Cyrus Imap Server 2.2.3
Conectiva Linux 9.0
Carnegie Mellon University Cyrus Imap Server 2.2.0 Alpha
Carnegie Mellon University Cyrus Imap Server 2.2.1 Beta
Openpkg Openpkg Current
Conectiva Linux 10.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Redhat Fedora Core Core 2.0
Redhat Fedora Core Core 3.0
Ubuntu Ubuntu Linux 4.1
Trustix Secure Linux 2.2
10
CVSSv2
CVE-2004-1013
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x up to and including 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an inde...
Carnegie Mellon University Cyrus Imap Server 2.1.7
Carnegie Mellon University Cyrus Imap Server 2.1.9
Carnegie Mellon University Cyrus Imap Server 2.2.7
Carnegie Mellon University Cyrus Imap Server 2.2.8
Carnegie Mellon University Cyrus Imap Server 2.1.10
Carnegie Mellon University Cyrus Imap Server 2.1.16
Carnegie Mellon University Cyrus Imap Server 2.2.5
Carnegie Mellon University Cyrus Imap Server 2.2.6
Carnegie Mellon University Cyrus Imap Server 2.2.2 Beta
Carnegie Mellon University Cyrus Imap Server 2.2.3
Carnegie Mellon University Cyrus Imap Server 2.2.4
Conectiva Linux 9.0
Carnegie Mellon University Cyrus Imap Server 2.2.0 Alpha
Carnegie Mellon University Cyrus Imap Server 2.2.1 Beta
Openpkg Openpkg Current
Conectiva Linux 10.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Redhat Fedora Core Core 2.0
Redhat Fedora Core Core 3.0
Ubuntu Ubuntu Linux 4.1
Trustix Secure Linux 2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »