Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ghost ghost vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2012-1191
The resolver in dnscache in Daniel J. Bernstein djbdns 1.05 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain names via a &...
D.j.bernstein Djbdns 1.05
4 Github repositories
6.4
CVSSv2
CVE-2012-1193
The resolver in PowerDNS Recursor (aka pdns_recursor) 3.3 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain names via a &qu...
Powerdns Powerdns Recursor 3.3
6.4
CVSSv2
CVE-2012-1194
The resolver in the DNS Server service in Microsoft Windows Server 2008 before R2 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoke...
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008
5
CVSSv2
CVE-2012-1033
The resolver in ISC BIND 9 up to and including 9.8.1-P1 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain names via a "...
Isc Bind 9.7.1
Isc Bind 9.7.3
Isc Bind 9.5.1
Isc Bind 9.6.0
Isc Bind 9.5.0
Isc Bind 9.2.1
Isc Bind 9.2.2
Isc Bind 9.0
Isc Bind 9.0.1
Isc Bind 9.7.2
Isc Bind 9.3
Isc Bind 9.2.7
Isc Bind 9.2.6
Isc Bind 9.4.1
Isc Bind 9.8.0
Isc Bind 9.8.1
Isc Bind 9.7.4
Isc Bind 9.1
Isc Bind 9.7.0
Isc Bind 9.4
Isc Bind 9.2.5
Isc Bind 9.5
9.3
CVSSv2
CVE-2010-3242
Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote malicious users to execute arbitrary code via a crafted Excel document, aka "Ghost Record Type Parsing Vulnerab...
Microsoft Excel 2002
Microsoft Office 2004
Microsoft Office 2008
Microsoft Open Xml File Format Converter
5
CVSSv2
CVE-2010-1066
AR Web Content Manager (AWCM) 2.1 stores sensitive information under the web root with insufficient access control, which allows remote malicious users to download a database via a direct request for control/db_backup.php.
The-ghost Ar Web Content Manager 2.1
1 EDB exploit
6.8
CVSSv2
CVE-2009-3218
SQL injection vulnerability in control/login.php in AR Web Content Manager (AWCM) 2.1, when magic_quotes_gpc is disabled, allows remote malicious users to execute arbitrary SQL commands via the username parameter.
The-ghost Ar Web Content Manager 2.1
1 EDB exploit
6.8
CVSSv2
CVE-2009-3219
Directory traversal vulnerability in a.php in AR Web Content Manager (AWCM) 2.1, when magic_quotes_gpc is disabled, allows remote malicious users to include and execute arbitrary local files via a .. (dot dot) in the a parameter.
The-ghost Ar Web Content Manager 2.1
1 EDB exploit
7.5
CVSSv2
CVE-2008-7087
PHP remote file inclusion vulnerability in search_wA.php in OpenPro 1.3.1 allows remote malicious users to execute arbitrary PHP code via a URL in the LIBPATH parameter.
Openpro Openpro 1.3.1
1 EDB exploit
4.3
CVSSv2
CVE-2009-1517
Multiple insecure method vulnerabilities in the Symantec.EasySetup.1 ActiveX control in EasySetupInt.dll 14.0.4.30167 in the EasySetup wizard in Symantec Norton Ghost 14.0 allow remote malicious users to cause a denial of service (browser crash) and possibly execute arbitrary cod...
Symantec Norton Ghost 14.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »