Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
shadow vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-2219
chetcpasswd.cgi in Pedro Lineu Orso chetcpasswd prior to 2.1 allows remote malicious users to read the last line of the shadow file via a long user (userid) field.
Chetcpasswd Chetcpasswd 2.1
1 EDB exploit
1.2
CVSSv2
CVE-2001-0120
useradd program in shadow-utils program may allow local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Mandrakesoft Mandrake Linux 7.0
6.4
CVSSv2
CVE-2001-0421
FTP server in Solaris 8 and previous versions allows local and remote malicious users to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sens...
Sun Solaris 2.6
Sun Sunos
1 EDB exploit
10
CVSSv2
CVE-2008-6703
Stack-based buffer overflow in the IPureServer::_Recieve function in S.T.A.L.K.E.R.: Shadow of Chernobyl 1.0006 and previous versions allows remote malicious users to execute arbitrary code via a compressed 0x39 packet, which is decompressed by the NET_Compressor::Decompress func...
Stalker-game S.t.a.l.k.e.r.\\ Shadow Of Chernobyl
1 EDB exploit
5
CVSSv2
CVE-2004-1741
Music daemon (musicd) 0.0.3 and previous versions allows remote malicious users to cause a denial of service (crash) by calling LOAD with a binary file as an argument, then calling SHOWLIST.
Music Daemon Music Daemon 0.1
Music Daemon Music Daemon 0.2
Music Daemon Music Daemon 0.3
1 EDB exploit
NA
CVE-2023-46841
Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, traditional stacks holding both data ...
NA
CVE-2023-23218
Welcome to open source, Elon. Your Twitter code just got a CVE for shadow ban bug
1 Article
4.3
CVSSv2
CVE-2012-4209
Mozilla Firefox prior to 17.0, Firefox ESR 10.x prior to 10.0.11, Thunderbird prior to 17.0, Thunderbird ESR 10.x prior to 10.0.11, and SeaMonkey prior to 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easie...
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Seamonkey
Mozilla Thunderbird
Mozilla Thunderbird Esr
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Software Development Kit 11
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.3
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Workstation 6.0
Canonical Ubuntu Linux 10.04
4
CVSSv2
CVE-2019-0703
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0704, CVE-2019-0821.
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2019 -
Microsoft Windows Server 2016 1709
Microsoft Windows Rt 8.1 -
Microsoft Windows 7 -
Microsoft Windows 10 1803
Microsoft Windows 10 -
Microsoft Windows 10 1607
Microsoft Windows 10 1703
Microsoft Windows 10 1709
Microsoft Windows Server 2016 -
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2008 -
Microsoft Windows 8.1 -
Microsoft Windows 10 1809
2 Articles
9.3
CVSSv2
CVE-2009-1642
Multiple stack-based buffer overflows in Mini-stream ASX to MP3 Converter 3.0.0.7 allow remote malicious users to execute arbitrary code via (1) a long rtsp URL in a .ram file and (2) a long string in the HREF attribute of a REF element in a .asx file. NOTE: the latter was also s...
Mini-stream Mini-stream To Mp3 Converter 3.0.0.7
6 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »