Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zen-parse vulnerabilities and exploits
(subscribe to this query)
6.2
CVSSv2
CVE-2001-0906
teTeX filter prior to 1.0.7 allows local users to gain privileges via a symlink attack on temporary files that are produced when printing .dvi files using lpr.
Tetex Tetex
1 EDB exploit
4.6
CVSSv2
CVE-2001-0787
LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.
Redhat Linux 7.0
Redhat Linux 7.1
1 EDB exploit
2.1
CVSSv2
CVE-2001-0409
vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory.
Vim Development Group Vim 5.7
1 EDB exploit
4.6
CVSSv2
CVE-2002-1165
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows malicious users to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2)...
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.1
Sendmail Sendmail 8.12.5
Sendmail Sendmail 8.12.0
Sendmail Sendmail 8.12.6
Sendmail Sendmail 8.12.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
1 EDB exploit
7.5
CVSSv2
CVE-2001-1022
Format string vulnerability in pic utility in groff 1.16.1 and other versions, and jgroff prior to 1.15, allows remote malicious users to bypass the -S option and execute arbitrary commands via format string specifiers in the plot command.
Gnu Groff 1.16.1
Gnu Groff 1.11a
Gnu Groff 1.14
Jgroff Jgroff
Gnu Groff 1.10
Gnu Groff 1.11
Gnu Groff 1.15
1 EDB exploit
7.2
CVSSv2
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
4 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2