Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
local server vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-12593
IceWarp Mail Server up to and including 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.
Icewarp Mail Server
1 EDB exploit
9.8
CVSSv3
CVE-2013-4743
Static HTTP Server 1.0 has a Local Overflow
Static Http Server Project Static Http Server 1.0
1 EDB exploit
7.8
CVSSv3
CVE-2020-1337
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 7 Sp1
Microsoft Windows Server 2016 1903
Microsoft Windows 10 1903
Microsoft Windows Server 2016 1909
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
11 Github repositories
NA
CVE-2011-1249
The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users t...
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7 -
Microsoft Windows Server 2008 R2
Microsoft Windows Xp
Microsoft Windows Server 2008 -
Microsoft Windows Xp -
Microsoft Windows 2003 Server
Microsoft Windows Server 2003
2 EDB exploits
5 Github repositories
NA
CVE-2004-2532
Serv-U FTP server prior to 5.1.0.0 has a default account and password for local administration, which allows local users to execute arbitrary commands by connecting to the server using the default administrator account, creating a new user, logging in as that new user, and then u...
Solarwinds Serv-u File Server 4.0.0.4
Solarwinds Serv-u File Server 3.1.0.0
Solarwinds Serv-u File Server 3.1.0.1
Solarwinds Serv-u File Server 5.0.0.0
Solarwinds Serv-u File Server
Solarwinds Serv-u File Server 3.1.0.3
Solarwinds Serv-u File Server 3.0.0.16
Solarwinds Serv-u File Server 4.1.0.0
Solarwinds Serv-u File Server 4.1.0.3
Solarwinds Serv-u File Server 5.0.0.4
Solarwinds Serv-u File Server 5.0.0.9
Solarwinds Serv-u File Server 3.0.0.17
1 EDB exploit
NA
CVE-2015-0003
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a ...
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows 8 -
Microsoft Windows Rt -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 -
Microsoft Windows Server 2003 -
Microsoft Windows Rt 8.1 -
Microsoft Windows 7 -
Microsoft Windows Vista -
1 EDB exploit
NA
CVE-2015-1676
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Server 2003 -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows 7 -
1 EDB exploit
NA
CVE-2015-1677
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 R2
Microsoft Windows 7 -
Microsoft Windows Vista -
Microsoft Windows 8.1 -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2003 -
1 EDB exploit
NA
CVE-2015-1680
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
Microsoft Windows Vista -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2003 -
1 EDB exploit
NA
CVE-2015-1678
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2003 -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 R2
Microsoft Windows Vista -
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »