Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ghost ghost vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-2371
Multiple Red Storm web-based games, including Ghost Recon 1.4 and previous versions, Desert Siege, and The Sum of all Fears 1.1.1.0 and previous versions, do not properly check return values from certain functions, which allows remote malicious users to cause a denial of service ...
Redstorm Desert Siege
Redstorm Ghost Recon 1.4
Redstorm The Sum Of All Fears 1.1.1.0
1 EDB exploit
7.8
CVSSv3
CVE-2016-6590
A privilege escalation vulnerability exists when loading DLLs during boot up and reboot in Symantec IT Management Suite 8.0 before 8.0 HF4 and Suite 7.6 before 7.6 HF7, Symantec Ghost Solution Suite 3.1 before 3.1 MP4, Symantec Endpoint Virtualization 7.x before 7.6 HF7, and Syma...
Symantec Encryption Desktop
Symantec Endpoint Encryption
Symantec Endpoint Encryption 7.6
Symantec Ghost Solution Suite 3.1
Symantec It Management Suite 7.6
Symantec It Management Suite 8.0
NA
CVE-2007-2361
Symantec Norton Ghost, Norton Save & Recovery, LiveState Recovery, and BackupExec System Recovery prior to 20070426, when remote backups of restore points images are configured, uses weak permissions (world readable) for a configuration file with network share credentials, wh...
Symantec Backupexec System Recovery 6.5
Symantec Norton Ghost 10.0
Symantec Backupexec System Recovery 6.53
Symantec Livestate Recovery 6.0
Symantec Norton Save And Recovery 1.01
Symantec Norton Save And Recovery 1.01b
Symantec Norton Save And Recovery 11.0
Symantec Backupexec System Recovery 6.52
Symantec Backupexec System Recovery 6.52a
Symantec Norton Ghost 10.01
Symantec Livestate Recovery 6.01
Symantec Livestate Recovery 6.02
Symantec Norton Save And Recovery 11.01
Symantec Norton Save And Recovery 11.01b
NA
CVE-2007-2360
Symantec Norton Ghost, Norton Save & Recovery, LiveState Recovery, and BackupExec System Recovery prior to 20070426, when remote backups of restore point images are configured, encrypt network share credentials with a key formed by a hash of the username, which allows local u...
Symantec Backupexec System Recovery 6.5
Symantec Backupexec System Recovery 6.52
Symantec Norton Ghost 10.01
Symantec Norton Ghost 10.0
Symantec Backupexec System Recovery 6.52a
Symantec Backupexec System Recovery 6.53
Symantec Norton Save And Recovery 1.01b
Symantec Norton Save And Recovery 11.0
Symantec Norton Save And Recovery 1.01
Symantec Livestate Recovery 6.0
Symantec Livestate Recovery 6.01
Symantec Livestate Recovery 6.02
Symantec Norton Save And Recovery 11.01
Symantec Norton Save And Recovery 11.01b
NA
CVE-2007-2359
Buffer overflow in Ghost Service Manager, as used in Symantec Norton Ghost, Norton Save & Recovery, LiveState Recovery, and BackupExec System Recovery prior to 20070426, allows local users to gain privileges via a long string.
Symantec Backupexec System Recovery 6.52
Symantec Backupexec System Recovery 6.52a
Symantec Norton Ghost 10.0
Symantec Norton Ghost 10.01
Symantec Backupexec System Recovery 6.5
Symantec Norton Save And Recovery 11.01b
Symantec Backupexec System Recovery 6.53
Symantec Livestate Recovery 6.0
Symantec Norton Save And Recovery 1.01
Symantec Norton Save And Recovery 1.01b
Symantec Livestate Recovery 6.01
Symantec Livestate Recovery 6.02
Symantec Norton Save And Recovery 11.0
Symantec Norton Save And Recovery 11.01
5.5
CVSSv3
CVE-2011-3477
GEAR Software CD DVD Filter driver (aka GEARAspiWDM.sys), as used in Symantec Backup Exec System Recovery 8.5 and BESR 2010, Symantec System Recovery 2011, Norton 360, and Norton Ghost, allows local users to cause a denial of service (system crash) via unspecified vectors.
Symantec Norton Ghost
Symantec System Recovery 2011 10.0
Symantec Backup Exec System Recovery 8.5
Symantec Backup Exec System Recovery 9.0
Symantec Norton 360 5.0
Symantec Backup Exec System Recovery 2010
8.1
CVSSv3
CVE-2017-8563
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to Kerberos falling back to NT LAN Manager (NTLM)...
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2012 R2
Microsoft Windows 10 -
Microsoft Windows 10 1511
Microsoft Windows 10 1607
Microsoft Windows 10 1703
Microsoft Windows Server 2008 R2
Microsoft Windows Rt 8.1
Microsoft Windows Server 2016
Microsoft Windows 8.1
Microsoft Windows Server 2012 -
3 Github repositories
1 Article
9.1
CVSSv3
CVE-2020-3419
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote malicious user to join a Webex session without appearing on the participant list. This vulnerability is due to improper handling of authentication tokens by a vulnerable...
Cisco Webex Meetings Server
Cisco Webex Meetings Server 3.0
Cisco Webex Meetings Server 4.0
NA
CVE-2024-34559
Insertion of Sensitive Information into Log File vulnerability in Ghost Foundation Ghost.This issue affects Ghost: from n/a up to and including 1.4.0.
NA
CVE-2023-34001
Improper Restriction of Excessive Authentication Attempts vulnerability in WPPlugins – WordPress Security Plugins Hide My WP Ghost allows Functionality Bypass.This issue affects Hide My WP Ghost: from n/a up to and including 5.0.25.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »