Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft services 3.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2015-0291
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
Openssl Openssl 1.0.2
3 Github repositories
2 Articles
5
CVSSv2
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
5
CVSSv2
CVE-2014-6331
Microsoft Active Directory Federation Services (AD FS) 2.0, 2.1, and 3.0, when a configured SAML Relying Party lacks a sign-out endpoint, does not properly process logoff actions, which makes it easier for remote malicious users to obtain access by leveraging an unattended workst...
Microsoft Active Directory Federation Services 2.1
Microsoft Active Directory Federation Services 2.0
Microsoft Active Directory Federation Services 3.0
5
CVSSv2
CVE-2013-0081
Microsoft SharePoint Portal Server 2003 SP3 and SharePoint Server 2007 SP3, 2010 SP1 and SP2, and 2013 do not properly process unassigned workflows, which allows remote malicious users to cause a denial of service (W3WP process hang) via a crafted URL, aka "SharePoint Denial...
Microsoft Sharepoint Services 3.0
Microsoft Sharepoint Foundation 2010
Microsoft Sharepoint Server 2007
Microsoft Sharepoint Foundation 2013
Microsoft Sharepoint Server 2013
Microsoft Sharepoint Server 2010
Microsoft Sharepoint Services 2.0
Microsoft Sharepoint Portal Server 2003
5
CVSSv2
CVE-2009-0217
The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Pro...
Mono Project Mono 1.2.4
Ibm Websphere Application Server 6.1.0.21
Mono Project Mono 1.2.1
Ibm Websphere Application Server 6.0.2.10
Ibm Websphere Application Server 6.1
Ibm Websphere Application Server 6.1.0.22
Ibm Websphere Application Server 6.1.0.19
Mono Project Mono 1.9
Ibm Websphere Application Server 6.0.2.1
Ibm Websphere Application Server 6.0.0.3
Ibm Websphere Application Server 6.1.0.2
Mono Project Mono 1.2.6
Ibm Websphere Application Server 6.0.1.15
Oracle Weblogic Server Component 8.1
Ibm Websphere Application Server 6.1.0.4
Oracle Application Server 10.1.3.4
Ibm Websphere Application Server 6.0.1.3
Ibm Websphere Application Server 6.0.2.20
Ibm Websphere Application Server 6.0.2.13
Ibm Websphere Application Server 6.1.0.11
Ibm Websphere Application Server 6.0.1.11
Ibm Websphere Application Server 7.0
5
CVSSv2
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Secure Access Control Server 3.2
Cisco Mgx 8230 1.2.11
Cisco Mgx 8250 1.2.10
Cisco Secure Access Control Server 3.2.2
Cisco Personal Assistant 1.3(2)
Cisco Unity Server 2.2
Cisco Secure Access Control Server 2.4
Cisco Secure Access Control Server 3.1.1
Cisco Personal Assistant 1.3(4)
Cisco Unity Server 3.0
Cisco Secure Access Control Server 2.6.3
Cisco Interactive Voice Response
Cisco Secure Access Control Server 2.42
Cisco Call Manager 3.0
Cisco Call Manager 3.1(3a)
Cisco Secure Access Control Server 3.3.2
Cisco Unity Server 3.1
Cisco Call Manager 1.0
Cisco Unity Server 3.3
Cisco Personal Assistant 1.3(3)
Cisco Secure Access Control Server 2.1
Cisco Secure Access Control Server 3.3(1)
1 EDB exploit
5
CVSSv2
CVE-2004-0634
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote malicious users to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
5
CVSSv2
CVE-2002-1140
The Sun Microsystems RPC library Services for Unix 3.0 Interix SD, as implemented on Microsoft Windows NT4, 2000, and XP, allows remote malicious users to cause a denial of service (service hang) via malformed packet fragments, aka "Improper parameter size check leading to d...
Microsoft Services 3.0
5
CVSSv2
CVE-2002-1141
An input validation error in the Sun Microsystems RPC library Services for Unix 3.0 Interix SD, as implemented on Microsoft Windows NT4, 2000, and XP, allows remote malicious users to cause a denial of service via malformed fragmented RPC client packets, aka "Denial of servi...
Microsoft Services 3.0
5
CVSSv2
CVE-2002-0072
The w3svc.dll ISAPI filter in Front Page Server Extensions and ASP.NET for Internet Information Server (IIS) 4.0, 5.0, and 5.1 does not properly handle the error condition when a long URL is provided, which allows remote malicious users to cause a denial of service (crash) when t...
Microsoft Internet Information Services 5.0
Microsoft Internet Information Server 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »