Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
shadow vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2009-1329
Stack-based buffer overflow in Mini-stream Shadow Stream Recorder 3.0.1.7 allows remote malicious users to execute arbitrary code via a long URI in a playlist (.m3u) file.
Mini-stream Shadow Stream Recorder 3.0.1.7
6 EDB exploits
10
CVSSv2
CVE-2008-6703
Stack-based buffer overflow in the IPureServer::_Recieve function in S.T.A.L.K.E.R.: Shadow of Chernobyl 1.0006 and previous versions allows remote malicious users to execute arbitrary code via a compressed 0x39 packet, which is decompressed by the NET_Compressor::Decompress func...
Stalker-game S.t.a.l.k.e.r. Shadow Of Chernobyl
1 EDB exploit
5
CVSSv2
CVE-2008-6702
S.T.A.L.K.E.R.: Shadow of Chernobyl 1.0006 and previous versions allows remote malicious users to cause a denial of service (crash) via a long nickname, which triggers an exception.
Stalker-game S.t.a.l.k.e.r. Shadow Of Chernobyl
1 EDB exploit
5
CVSSv2
CVE-2008-6704
Integer overflow in the NET_Compressor::Decompress function in S.T.A.L.K.E.R.: Shadow of Chernobyl 1.0006 and previous versions allows remote malicious users to cause a denial of service (server crash) via a crafted packet with a 0xc1 value that contains no compressed data, which...
Stalker-game S.t.a.l.k.e.r. Shadow Of Chernobyl
5
CVSSv2
CVE-2008-6705
The MultipacketReciever::RecievePacket function in S.T.A.L.K.E.R.: Shadow of Chernobyl 1.0006 and previous versions allows remote malicious users to cause a denial of service (server termination) via a crafted packet without an expected 0xe0 or 0xe1 value, which triggers the INT3...
Stalker-game S.t.a.l.k.e.r. Shadow Of Chernobyl
2.1
CVSSv2
CVE-2006-1844
The Debian installer for the (1) shadow 4.0.14 and (2) base-config 2.53.10 packages includes sensitive information in world-readable log files, including preseeded passwords and pppoeconf passwords, which might allow local users to gain privileges.
Debian Base-config 2.53.10
Debian Shadow 4.0.14
4.6
CVSSv2
CVE-2017-20002
The Debian shadow package prior to 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok...
Debian Debian Linux 9.0
Debian Shadow 4.4
3.3
CVSSv2
CVE-2013-4235
shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
Debian Shadow -
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 17
Fedoraproject Fedora 16
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 5
7.2
CVSSv2
CVE-2005-4890
There is a possible tty hijacking in shadow 4.x prior to 4.1.5 and sudo 1.x prior to 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next proces...
Sudo Project Sudo
Debian Shadow
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 4
Redhat Enterprise Linux 5
2 Github repositories
4
CVSSv2
CVE-2008-7011
The Unreal engine, as used in Unreal Tournament 3 1.3, Unreal Tournament 2003 and 2004, Dead Man's Hand, Pariah, WarPath, Postal2, and Shadow Ops, allows remote authenticated users to cause a denial of service (server exit) via multiple file downloads from the server, which ...
Epic Games Unreal Tournament 2004
Human Head Studios Dead Mans Hand
Epic Games Unreal Tournament 2003
Digital Extreme Pariah
Red Mercury Shadow Ops
Groove Games Warpath
Whiptail Interactive Postal 2
Epic Games Unreal Tournament 3
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »