Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ghost ghost vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv2
CVE-2016-6590
A privilege escalation vulnerability exists when loading DLLs during boot up and reboot in Symantec IT Management Suite 8.0 before 8.0 HF4 and Suite 7.6 before 7.6 HF7, Symantec Ghost Solution Suite 3.1 before 3.1 MP4, Symantec Endpoint Virtualization 7.x before 7.6 HF7, and Syma...
Symantec Encryption Desktop
Symantec Endpoint Encryption
Symantec Endpoint Encryption 7.6
Symantec Ghost Solution Suite 3.1
Symantec It Management Suite 7.6
Symantec It Management Suite 8.0
4
CVSSv2
CVE-2016-10983
The ghost plugin prior to 0.5.6 for WordPress has no access control for wp-admin/tools.php?ghostexport=true downloads of exported data.
Ghost Ghost
1.9
CVSSv2
CVE-2019-12762
Xiaomi Mi 5s Plus devices allow malicious users to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.
Mi Mi 5s Plus Firmware -
Sony Xperia Z4 Firmware -
Samsung Galaxy S6 Edge Firmware -
Samsung Galaxy S4 Firmware -
Google Nexus 7 Firmware -
Google Nexus 9 Firmware -
Sharp Aquos Zeta Sh-04f Firmware -
Fujitsu Arrows Nx F05-f Firmware -
6
CVSSv2
CVE-2018-18364
Symantec Ghost Solution Suite (GSS) versions before 3.3 RU1 may be susceptible to a DLL hijacking vulnerability, which is a type of issue whereby a potential attacker attempts to execute unexpected code on your machine. This occurs via placement of a potentially foreign file (DLL...
Symantec Ghost Solution Suite 2.5
Symantec Ghost Solution Suite 2.0
Symantec Ghost Solution Suite 3.2
Symantec Ghost Solution Suite 3.0
Symantec Ghost Solution Suite 3.1
Symantec Ghost Solution Suite 3.3
4.9
CVSSv2
CVE-2011-3477
GEAR Software CD DVD Filter driver (aka GEARAspiWDM.sys), as used in Symantec Backup Exec System Recovery 8.5 and BESR 2010, Symantec System Recovery 2011, Norton 360, and Norton Ghost, allows local users to cause a denial of service (system crash) via unspecified vectors.
Symantec Norton Ghost
Symantec System Recovery 2011 10.0
Symantec Backup Exec System Recovery 8.5
Symantec Backup Exec System Recovery 9.0
Symantec Norton 360 5.0
Symantec Backup Exec System Recovery 2010
5.1
CVSSv2
CVE-2017-8563
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to Kerberos falling back to NT LAN Manager (NTLM)...
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2012 R2
Microsoft Windows 10 -
Microsoft Windows 10 1511
Microsoft Windows 10 1607
Microsoft Windows 10 1703
Microsoft Windows Server 2008 R2
Microsoft Windows Rt 8.1
Microsoft Windows Server 2016
Microsoft Windows 8.1
Microsoft Windows Server 2012 -
3 Github repositories
1 Article
6.8
CVSSv2
CVE-2015-5689
ghostexp.exe in Ghost Explorer Utility in Symantec Ghost Solutions Suite (GSS) prior to 3.0 HF2 12.0.0.8010 and Symantec Deployment Solution (DS) prior to 7.6 HF4 12.0.0.7045 performs improper sign-extend operations before array-element accesses, which allows remote malicious use...
Symantec Ghost Solutions Suite 1.0
Symantec Ghost Solutions Suite 1.1
Symantec Ghost Solutions Suite 2.0.1
Symantec Ghost Solutions Suite 2.0
Symantec Ghost Solutions Suite 2.1
Symantec Ghost Solutions Suite 2.0.2
Symantec Deployment Solution 6.9
6.8
CVSSv2
CVE-2012-0306
Symantec Ghost Solution Suite 2.x up to and including 2.5.1 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted backup file.
Symantec Ghost Solutions Suite 2.5
Symantec Ghost Solutions Suite 2.0.0
Symantec Ghost Solutions Suite 2.0.1
Symantec Ghost Solutions Suite 2.0
4.3
CVSSv2
CVE-2012-1570
The resolver in MaraDNS prior to 1.3.0.7.15 and 1.4.x prior to 1.4.12 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain nam...
Maradns Maradns
6.4
CVSSv2
CVE-2012-1191
The resolver in dnscache in Daniel J. Bernstein djbdns 1.05 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain names via a &...
D.j.bernstein Djbdns 1.05
4 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »