Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
markus vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1227
Drupal 4.5.x prior to 4.5.8 and 4.6.x prior to 4.5.8, when menu.module is used to create a menu item, does not implement access control for the page that is referenced, which might allow remote malicious users to access administrator pages.
Drupal Drupal 4.5.6
Drupal Drupal 4.5.7
Drupal Drupal 4.5.2
Drupal Drupal 4.5.3
Drupal Drupal 4.6.2
Drupal Drupal 4.6.3
Drupal Drupal 4.5.0
Drupal Drupal 4.5.1
Drupal Drupal 4.6.0
Drupal Drupal 4.6.1
Drupal Drupal 4.5.4
Drupal Drupal 4.5.5
Drupal Drupal 4.6.4
Drupal Drupal 4.6.5
NA
CVE-2006-1228
Session fixation vulnerability in Drupal 4.5.x prior to 4.5.8 and 4.6.x prior to 4.5.8 allows remote malicious users to gain privileges by tricking a user to click on a URL that fixes the session identifier.
Drupal Drupal 4.5.0
Drupal Drupal 4.5.1
Drupal Drupal 4.6.0
Drupal Drupal 4.6.1
Drupal Drupal 4.5.2
Drupal Drupal 4.5.3
7.5
CVSSv3
CVE-2017-7675
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.
Apache Tomcat 8.5.2
Apache Tomcat 8.5.9
Apache Tomcat 8.5.4
Apache Tomcat 8.5.0
Apache Tomcat 8.5.15
Apache Tomcat 8.5.10
Apache Tomcat 8.5.13
Apache Tomcat 8.5.14
Apache Tomcat 8.5.5
Apache Tomcat 8.5.3
Apache Tomcat 8.5.6
Apache Tomcat 8.5.7
Apache Tomcat 8.5.8
Apache Tomcat 8.5.12
Apache Tomcat 8.5.11
Apache Tomcat 8.5.1
Apache Tomcat 9.0.0
NA
CVE-2013-1843
Open redirect vulnerability in the Access tracking mechanism in TYPO3 4.5.x prior to 4.5.24, 4.6.x prior to 4.6.17, 4.7.x prior to 4.7.9, and 6.0.x prior to 6.0.3 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified v...
Typo3 Typo3 4.5.8
Typo3 Typo3 4.5.12
Typo3 Typo3 4.5.5
Typo3 Typo3 4.5.4
Typo3 Typo3 4.5.19
Typo3 Typo3 4.5.16
Typo3 Typo3 4.5.15
Typo3 Typo3 4.5
Typo3 Typo3 4.5.6
Typo3 Typo3 4.5.17
Typo3 Typo3 4.5.2
Typo3 Typo3 4.5.23
Typo3 Typo3 4.5.22
Typo3 Typo3 4.5.10
Typo3 Typo3 4.5.9
Typo3 Typo3 4.5.1
Typo3 Typo3 4.5.18
Typo3 Typo3 4.5.7
Typo3 Typo3 4.5.11
Typo3 Typo3 4.5.0
Typo3 Typo3 4.5.3
Typo3 Typo3 4.5.14
NA
CVE-2013-1842
SQL injection vulnerability in the Extbase Framework in TYPO3 4.5.x prior to 4.5.24, 4.6.x prior to 4.6.17, 4.7.x prior to 4.7.9, and 6.0.x prior to 6.0.3 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors, related to "the Query Object Mo...
Typo3 Typo3 4.5.22
Typo3 Typo3 4.5.8
Typo3 Typo3 4.5.5
Typo3 Typo3 4.5.4
Typo3 Typo3 4.5.19
Typo3 Typo3 4.5.16
Typo3 Typo3 4.5.11
Typo3 Typo3 4.5
Typo3 Typo3 4.5.17
Typo3 Typo3 4.5.2
Typo3 Typo3 4.5.13
Typo3 Typo3 4.5.23
Typo3 Typo3 4.5.6
Typo3 Typo3 4.5.10
Typo3 Typo3 4.5.9
Typo3 Typo3 4.5.1
Typo3 Typo3 4.5.18
Typo3 Typo3 4.5.12
Typo3 Typo3 4.5.7
Typo3 Typo3 4.5.0
Typo3 Typo3 4.5.3
Typo3 Typo3 4.5.15
NA
CVE-2005-1849
inftrees.h in zlib 1.2.2 allows remote malicious users to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.
Zlib Zlib 1.2.2
7.5
CVSSv3
CVE-2016-2055
xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x prior to 4.3.25 allow remote malicious users to read arbitrary files in the configuration directory via a "config" command.
Xymon Xymon 4.3.9
Xymon Xymon 4.3.8
Xymon Xymon 4.3.23
Xymon Xymon 4.3.22
Xymon Xymon 4.3.17
Xymon Xymon 4.3.16
Xymon Xymon 4.3.0
Xymon Xymon 4.2.2
Xymon Xymon 4.2.0
Xymon Xymon 4.1.1
Xymon Xymon 4.1.0
Xymon Xymon 4.3.5
Xymon Xymon 4.3.4
Xymon Xymon 4.3.2
Xymon Xymon 4.3.19
Xymon Xymon 4.3.13
Xymon Xymon 4.3.12
Xymon Xymon 4.2.3
Xymon Xymon 4.2
Xymon Xymon 4.1.2
Xymon Xymon 4.3.3
Xymon Xymon 4.3.24
1 Metasploit module
8.8
CVSSv3
CVE-2016-2056
xymond in Xymon 4.1.x, 4.2.x, and 4.3.x prior to 4.3.25 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the adduser_name argument in (1) web/useradm.c or (2) web/chpasswd.c.
Xymon Xymon 4.3.5
Xymon Xymon 4.3.4
Xymon Xymon 4.3.2
Xymon Xymon 4.3.19
Xymon Xymon 4.3.13
Xymon Xymon 4.3.12
Xymon Xymon 4.3.0
Xymon Xymon 4.2.3
Xymon Xymon 4.2
Xymon Xymon 4.1.2
Xymon Xymon 4.3.9
Xymon Xymon 4.3.8
Xymon Xymon 4.3.23
Xymon Xymon 4.3.22
Xymon Xymon 4.3.17
Xymon Xymon 4.3.16
Xymon Xymon 4.2.2
Xymon Xymon 4.2.0
Xymon Xymon 4.1.1
Xymon Xymon 4.1.0
Xymon Xymon 4.3.7
Xymon Xymon 4.3.6
1 EDB exploit
3.3
CVSSv3
CVE-2016-2057
lib/xymond_ipc.c in Xymon 4.1.x, 4.2.x, and 4.3.x prior to 4.3.25 use weak permissions (666) for an unspecified IPC message queue, which allows local users to inject arbitrary messages by writing to that queue.
Xymon Xymon 4.3.24
Xymon Xymon 4.3.23
Xymon Xymon 4.3.17
Xymon Xymon 4.3.16
Xymon Xymon 4.3.9
Xymon Xymon 4.3.8
Xymon Xymon 4.3.0
Xymon Xymon 4.2.2
Xymon Xymon 4.1.2
Xymon Xymon 4.1.1
Xymon Xymon 4.1.0
Xymon Xymon 4.3.22
Xymon Xymon 4.3.21
Xymon Xymon 4.3.15
Xymon Xymon 4.3.14
Xymon Xymon 4.3.7
Xymon Xymon 4.3.6
Xymon Xymon 4.2.0
Xymon Xymon 4.2
Xymon Xymon 4.3.19
Xymon Xymon 4.3.18
Xymon Xymon 4.3.11
9.8
CVSSv3
CVE-2016-2054
Multiple buffer overflows in xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x prior to 4.3.25 allow remote malicious users to execute arbitrary code or cause a denial of service (daemon crash) via a long filename, involving handling a "config" command.
Debian Debian Linux 8.0
Xymon Xymon 4.3.3
Xymon Xymon 4.3.24
Xymon Xymon 4.3.19
Xymon Xymon 4.3.18
Xymon Xymon 4.3.11
Xymon Xymon 4.3.10
Xymon Xymon 4.2.3
Xymon Xymon 4.2.2
Xymon Xymon 4.1.2
Xymon Xymon 4.3.8
Xymon Xymon 4.3.7
Xymon Xymon 4.3.6
Xymon Xymon 4.3.21
Xymon Xymon 4.3.20
Xymon Xymon 4.3.15
Xymon Xymon 4.3.14
Xymon Xymon 4.3.0
Xymon Xymon 4.2
Xymon Xymon 4.3.5
Xymon Xymon 4.3.4
Xymon Xymon 4.3.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »