Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
article system vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2007-6078
Multiple SQL injection vulnerabilities in SkyPortal RC6 allow remote malicious users to execute arbitrary SQL commands via unspecified parameters to (1) nc_top.asp; (2) inc_bookmarks.asp, possibly involving a parameter passed from cp_main.asp; (3) inc_profile_functions.asp; or (4...
Skyportal Skyportal Rc6
1 EDB exploit
NA
CVE-2024-25124
Fiber is a web framework written in go. Prior to version 2.52.1, the CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header t...
9.3
CVSSv2
CVE-2007-3896
The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote malicious users to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated usi...
Microsoft Internet Explorer 7.0
1 EDB exploit
7.5
CVSSv2
CVE-2006-0057
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to bypass the Kill bit settings for dangerous ActiveX controls via unknown vectors involving crafted HTML, which can expose the browser to attacks that would otherwise be prevented by the Kill bit setting....
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Ie 6
10
CVSSv2
CVE-2003-0528
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote malicious users to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nac...
Microsoft Windows 2003 Server R2
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
7.5
CVSSv2
CVE-2005-3120
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and previous versions allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
Invisible-island Lynx
Debian Debian Linux 3.1
Debian Debian Linux 3.0
1 EDB exploit
10
CVSSv2
CVE-2003-0715
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote malicious users to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability t...
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
9.3
CVSSv2
CVE-2020-1472
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2016 1903
Microsoft Windows Server 2016 1909
Microsoft Windows Server 2016 2004
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Leap 15.1
Opensuse Leap 15.2
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Synology Directory Server
Samba Samba
Debian Debian Linux 9.0
Oracle Zfs Storage Appliance Kit 8.8
157 Github repositories
16 Articles
5.8
CVSSv2
CVE-2014-5117
Tor prior to 0.2.4.23 and 0.2.5 prior to 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote malicious users to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a ...
Torproject Tor 0.0.2
Torproject Tor 0.0.3
Torproject Tor 0.0.4
Torproject Tor 0.0.7.2
Torproject Tor 0.0.7.3
Torproject Tor 0.0.9.5
Torproject Tor 0.0.9.6
Torproject Tor 0.1.0.14
Torproject Tor 0.1.0.15
Torproject Tor 0.1.1.24
Torproject Tor 0.1.1.25
Torproject Tor 0.1.2.18
Torproject Tor 0.1.2.19
Torproject Tor 0.2.2.19
Torproject Tor 0.2.2.20
Torproject Tor 0.2.2.27
Torproject Tor 0.2.2.28
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.36
Torproject Tor 0.2.3.17
Torproject Tor 0.2.3.18
Torproject Tor 0.2.4.1
7.5
CVSSv2
CVE-2000-0419
The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote malicious users to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability.
Microsoft Photodraw 2000 1.0
Microsoft Powerpoint 2000
Microsoft Project 2000
Microsoft Access 2000
Microsoft Word 2000
Microsoft Works 2000
Microsoft Office 2000
Microsoft Outlook 2000
Microsoft Excel 2000
Microsoft Frontpage 2000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »