Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache tomcat 3.2 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2008-2938
Directory traversal vulnerability in Apache Tomcat 4.1.0 up to and including 4.1.37, 5.5.0 up to and including 5.5.26, and 6.0.0 up to and including 6.0.16, when allowLinking and UTF-8 are enabled, allows remote malicious users to read arbitrary files via encoded directory traver...
Apache Tomcat
2 EDB exploits
2 Metasploit modules
1 Github repository
10
CVSSv2
CVE-2010-0219
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote malicious users to execute arbitrary code by uploading a crafted web s...
Apache Axis2 1.3
Apache Axis2 1.4
Apache Axis2 1.4.1
Apache Axis2 1.5
Apache Axis2 1.5.1
Apache Axis2 1.5.2
Apache Axis2 1.6
Sap Businessobjects 3.2
3 EDB exploits
1 Github repository
7.5
CVSSv2
CVE-2010-4367
awstats.cgi in AWStats prior to 7.0 accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
Awstats Awstats 5.7
Awstats Awstats 6.3
Awstats Awstats 3.0
Awstats Awstats 6.5
Awstats Awstats 3.1
Awstats Awstats 5.9
Awstats Awstats 1.0
Awstats Awstats
Awstats Awstats 6.1
Awstats Awstats 6.2
Awstats Awstats 5.0
Awstats Awstats 5.2
Awstats Awstats 6.8
Awstats Awstats 5.6
Awstats Awstats 2.2.3
Awstats Awstats 5.1
Awstats Awstats 6.4 1
Awstats Awstats 4.0
Awstats Awstats 6.5 1
Awstats Awstats 6.0
Awstats Awstats 6.9
Awstats Awstats 5.4
1 EDB exploit
7.5
CVSSv2
CVE-2010-4368
awstats.cgi in AWStats prior to 7.0 on Windows accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
Awstats Awstats
Awstats Awstats 1.0
Awstats Awstats 2.1.
Awstats Awstats 2.2.3
Awstats Awstats 2.2.4
Awstats Awstats 3.0
Awstats Awstats 3.1
Awstats Awstats 3.2
Awstats Awstats 4.0
Awstats Awstats 4.1
Awstats Awstats 5.0
Awstats Awstats 5.1
Awstats Awstats 5.2
Awstats Awstats 5.3
Awstats Awstats 5.4
Awstats Awstats 5.5
Awstats Awstats 5.6
Awstats Awstats 5.7
Awstats Awstats 5.8
Awstats Awstats 5.9
Awstats Awstats 6.0
Awstats Awstats 6.1
9.3
CVSSv2
CVE-2021-44228
Apache Log4j2 2.0-beta9 up to and including 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can contr...
Apache Log4j 2.0
Apache Log4j
Siemens Sppa-t3000 Ses3000 Firmware
Siemens Logo! Soft Comfort
Siemens Spectrum Power 4 4.70
Siemens Spectrum Power 4
Siemens Siveillance Control Pro
Siemens Energyip Prepay 3.7
Siemens Energyip Prepay 3.8
Siemens Siveillance Identity 1.6
Siemens Siveillance Identity 1.5
Siemens Siveillance Command
Siemens Sipass Integrated 2.85
Siemens Sipass Integrated 2.80
Siemens Head-end System Universal Device Integration System
Siemens Gma-manager
Siemens Energyip 8.5
Siemens Energyip 8.6
Siemens Energyip 8.7
Siemens Energyip 9.0
Siemens Energy Engage 3.1
Siemens E-car Operation Center
2 Metasploit modules
1182 Github repositories
28 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2