Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eeye vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0569
Sybergen Sygate allows remote malicious users to cause a denial of service by sending a malformed DNS UDP packet to its internal interface.
Sybergen Sygate 2.0
Sybergen Sygate 3.11
1 EDB exploit
NA
CVE-1999-1551
Buffer overflow in Ipswitch IMail Service 5.0 allows an malicious user to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL.
Ipswitch Imail 5.0
Ipswitch Imail 6.0
1 EDB exploit
NA
CVE-2003-0812
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote malicious users to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the Net...
Microsoft Windows 2000
Microsoft Windows Xp
4 EDB exploits
NA
CVE-2004-0375
SYMNDIS.SYS in Symantec Norton Internet Security 2003 and 2004, Norton Personal Firewall 2003 and 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 and 1.1 allow remote malicious users to cause a denial of service (infinite loop) via a TCP packet with (1) SACK option ...
Symantec Norton Internet Security 2004
Symantec Norton Internet Security 2003
Symantec Client Security 1.0
Symantec Client Security 1.1
Symantec Client Firewall 5.01
Symantec Client Firewall 5.1.1
Symantec Norton Personal Firewall 2003
Symantec Norton Personal Firewall 2004
1 EDB exploit
NA
CVE-1999-0874
Buffer overflow in IIS 4.0 allows remote malicious users to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
Microsoft Internet Information Server 4.0
Microsoft Windows Nt 4.0
Microsoft Windows Nt
Microsoft Windows 2000
5 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4