Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
server message block vulnerabilities and exploits
(subscribe to this query)
945
VMScore
CVE-2017-0148
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote malicious users to execute arbitrary code v...
Microsoft Server Message Block 1.0
3 EDB exploits
1 Github repository
1 Article
935
VMScore
CVE-2007-6015
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 up to and including 3.0.27a, when the "domain logons" option is enabled, allows remote malicious users to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string...
Samba Samba 3.0.14a
Samba Samba 2.2.1a
Samba Samba 3.0.27
Samba Samba 2.0.10
Samba Samba 2.2.12
Samba Samba 3.0.25
Samba Samba 2.0.1
Samba Samba 3.0.25b
Samba Samba 2.2.3a
Samba Samba 2.0.2
Samba Samba 3.0.2a
Samba Samba 2.2.8a
Samba Samba 3.0.26a
Samba Samba 3.0.21a
Samba Samba 3.0.20a
Samba Samba 2.2.9
Samba Samba 2.2.3
Samba Samba 3.0.21b
Samba Samba 2.0.6
Samba Samba 3.0.0
Samba Samba 2.2.11
Samba Samba 3.0.11
1 EDB exploit
890
VMScore
CVE-2008-4038
Buffer underflow in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote malicious users to execute arbitrary code via a Server Message Block (SMB) request that contains a filename with a crafted length, aka "...
Microsoft Windows Xp
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows 2000
Microsoft Windows Server 2008
Microsoft Windows Vista Sp1
890
VMScore
CVE-2008-4070
Heap-based buffer overflow in Mozilla Thunderbird prior to 2.0.0.17 and SeaMonkey prior to 1.1.12 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a long header in a news article, related to "canceling [a] ...
Mozilla Seamonkey 1.1.10
Mozilla Thunderbird 1.5.0.7
Mozilla Thunderbird 0.6
Mozilla Seamonkey 1.0.3
Mozilla Thunderbird 0.7.2
Mozilla Thunderbird 2.0.0.4
Mozilla Seamonkey 1.0.1
Mozilla Thunderbird 2.0.0.6
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Thunderbird 0.3
Mozilla Thunderbird 0.2
Mozilla Seamonkey 1.0
Mozilla Thunderbird 1.0.7
Mozilla Seamonkey 1.0.99
Mozilla Thunderbird 2.0.0.9
Mozilla Thunderbird
Mozilla Seamonkey 1.0.7
Mozilla Thunderbird 2.0.0.15
Mozilla Thunderbird 2.0.0.7
Mozilla Thunderbird 1.7.1
Mozilla Thunderbird 1.5.0.3
890
VMScore
CVE-2007-5351
Unspecified vulnerability in Server Message Block Version 2 (SMBv2) signing support in Microsoft Windows Vista allows remote malicious users to force signature re-computation and execute arbitrary code via a crafted SMBv2 packet, aka "SMBv2 Signing Vulnerability."
Microsoft Windows Vista
890
VMScore
CVE-2004-0882
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x up to and including 3.0.7 may allow remote malicious users to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.
Samba Samba 3.0.3
Samba Samba 3.0.2a
Samba Samba 3.0.5
Samba Samba 3.0.6
Samba Samba 3.0.4
Samba Samba 3.0.0
Samba Samba 3.0.7
Samba Samba 3.0.2
Conectiva Linux 10.0
Samba Samba 3.0.1
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Redhat Enterprise Linux Desktop 3.0
Ubuntu Ubuntu Linux 4.1
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Redhat Fedora Core Core 3.0
890
VMScore
CVE-2003-0819
Buffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote malicious users to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 ...
Microsoft Proxy Server 2.0
828
VMScore
CVE-2017-0272
The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an malicious user to execute r...
Microsoft Windows Rt 8.1
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Windows 7
Microsoft Windows 10 1511
Microsoft Windows 10 1607
Microsoft Windows 8.1
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008
Microsoft Windows 10 1703
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
1 Article
802
VMScore
CVE-2008-0166
OpenSSL 0.9.8c-1 up to versions prior to 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote malicious users to conduct brute force guessing attacks against cryptographic keys.
Openssl Openssl
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 4.0
3 EDB exploits
25 Github repositories
801
VMScore
CVE-2019-0630
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests, aka 'Windows SMB Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0633.
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows 10 1703
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »