Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft project server 2010 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2018-8575
A remote code execution vulnerability exists in Microsoft Project software when it fails to properly handle objects in memory, aka "Microsoft Project Remote Code Execution Vulnerability." This affects Microsoft Project, Office 365 ProPlus, Microsoft Project Server.
Microsoft Project 2010
Microsoft Project 2016
Microsoft Office 365 Proplus -
Microsoft Project 2013
7.5
CVSSv2
CVE-2010-4367
awstats.cgi in AWStats prior to 7.0 accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
Awstats Awstats 6.3
Awstats Awstats 2.2.4
Awstats Awstats 6.5 1
Awstats Awstats 2.2.3
Awstats Awstats 6.0
Awstats Awstats 5.9
Awstats Awstats 5.2
Awstats Awstats 5.1
Awstats Awstats 6.2
Awstats Awstats 3.1
Awstats Awstats 6.5
Awstats Awstats 2.1.
Awstats Awstats 6.7
Awstats Awstats 6.1
Awstats Awstats 5.4
Awstats Awstats 5.3
Awstats Awstats 6.4
Awstats Awstats 6.4 1
Awstats Awstats 6.5 1.857
Awstats Awstats 4.1
Awstats Awstats 1.0
Awstats Awstats 5.8
1 EDB exploit
7.5
CVSSv2
CVE-2010-4368
awstats.cgi in AWStats prior to 7.0 on Windows accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
Awstats Awstats 6.4
Awstats Awstats 6.4 1
Awstats Awstats 2.2.3
Awstats Awstats 4.1
Awstats Awstats 5.9
Awstats Awstats 5.7
Awstats Awstats 5.0
Awstats Awstats
Awstats Awstats 3.0
Awstats Awstats 6.5
Awstats Awstats 2.1.
Awstats Awstats 6.5 1
Awstats Awstats 5.5
Awstats Awstats 5.4
Awstats Awstats 5.3
Awstats Awstats 5.2
Awstats Awstats 3.2
Awstats Awstats 6.2
Awstats Awstats 3.1
Awstats Awstats 6.3
Awstats Awstats 6.9
Awstats Awstats 6.6
5
CVSSv2
CVE-2009-0217
The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Pro...
Oracle Application Server 10.1.3.4
Oracle Application Server 10.1.2.3
Oracle Bea Product Suite 10.0
Mono Project Mono 2.0
Oracle Weblogic Server Component 10.3
Oracle Weblogic Server Component 10.0
Ibm Websphere Application Server 6.0.2.10
Ibm Websphere Application Server 6.0.2.12
Ibm Websphere Application Server 6.0.1.1
Ibm Websphere Application Server 6.0.1.13
Ibm Websphere Application Server 6.0.2.2
Ibm Websphere Application Server 6.0.2.19
Ibm Websphere Application Server 6.0.2.21
Ibm Websphere Application Server 6.0.0.2
Ibm Websphere Application Server 6.0.2.29
Ibm Websphere Application Server 6.0.2.28
Ibm Websphere Application Server 6.0.2.25
Ibm Websphere Application Server 6.1.0.20
Ibm Websphere Application Server 6.1.0.22
Ibm Websphere Application Server 6.1.0.13
Ibm Websphere Application Server 6.1.0.14
Ibm Websphere Application Server 6.1.0.3
5.8
CVSSv2
CVE-2009-3555
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and previous versions, OpenSSL prior to 0.9.8l, GnuTLS 2.8.5 and previous versions, Mozilla Network Security Ser...
Openssl Openssl 1.0
Apache Http Server
Openssl Openssl
Gnu Gnutls
Mozilla Nss
Debian Debian Linux 5.0
Canonical Ubuntu Linux 10.10
Fedoraproject Fedora 11
Fedoraproject Fedora 13
Debian Debian Linux 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 9.04
Debian Debian Linux 6.0
Fedoraproject Fedora 12
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Fedoraproject Fedora 14
F5 Nginx
2 EDB exploits
10 Github repositories
4.7
CVSSv2
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
42 Github repositories
9 Articles
1.9
CVSSv2
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
47 Github repositories
9 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2