Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tools vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2020-21724
Buffer Overflow vulnerability in ExtractorInformation function in streamExtractor.cpp in oggvideotools 0.9.1 allows remaote malicious users to run arbitrary code via opening of crafted ogg file.
Ogg Video Tools Project Ogg Video Tools 0.9.1
9.3
CVSSv2
CVE-2016-10677
google-closure-tools-latest is a Node.js module wrapper for downloading the latest version of the Google Closure tools google-closure-tools-latest downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (...
Google-closure-tools-latest Project Google-closure-tools-latest
7.5
CVSSv2
CVE-2006-3752
Multiple SQL injection vulnerabilities in class.php in Professional Home Page Tools Guestbook allow remote malicious users to execute arbitrary SQL commands via the (1) hidemail, (2) name, (3) mail, (4) ip, or (5) text parameters.
Professional Home Page Tools Professional Home Page Tools Guestbook
6.4
CVSSv2
CVE-2006-3753
setcookie.php for the administration login in Professional Home Page Tools Guestbook records the hash of the administrator password in a cookie, which allows malicious users to conduct brute force password guessing attacks after obtaining the hash.
Professional Home Page Tools Professional Home Page Tools Guestbook
5
CVSSv2
CVE-2006-3837
delcookie.php in Professional Home Page Tools Guestbook changes the expiration date of a cookie instead of deleting the cookie's value, which makes it easier for malicious users to steal the cookie and obtain the administrator's password hash after logout.
Professional Home Page Tools Professional Home Page Tools Guestbook
6.8
CVSSv2
CVE-2020-6070
An exploitable code execution vulnerability exists in the file system checking functionality of fsck.f2fs 1.12.0. A specially crafted f2fs file can cause a logic flaw and out-of-bounds heap operations, resulting in code execution. An attacker can provide a malicious file to trigg...
F2fs-tools Project F2fs-tools 1.12.0
Fedoraproject Fedora 33
5
CVSSv2
CVE-2008-2969
Directory traversal vulnerability in download.php in Academic Web Tools (AWT YEKTA) 1.4.3.1, and 1.4.2.8 and previous versions, allows remote malicious users to read arbitrary files via a .. (dot dot) in the dfile parameter.
Yektaweb Academic Web Tools
Yektaweb Academic Web Tools 1.4.3.1
1 EDB exploit
7.5
CVSSv2
CVE-2006-4051
PHP remote file inclusion vulnerability in global.php in Turnkey Web Tools PHP Live Helper 2.0 and previous versions allows remote malicious users to execute arbitrary PHP code via a URL in the abs_path parameter.
Turnkey Web Tools Php Live Helper
Turnkey Web Tools Php Live Helper 1.8
Turnkey Web Tools Php Live Helper 2.0 Beta
1 EDB exploit
5
CVSSv2
CVE-2000-0739
Directory traversal vulnerability in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote malicious users to read arbitrary files via a .. (dot dot) attack in an HTTPS request to the enrollment server.
Network Associates Net Tools Pki Server 1.0hotfix1
Network Associates Net Tools Pki Server 1.0hotfix2
Network Associates Net Tools Pki Server 1.0
1 EDB exploit
5
CVSSv2
CVE-2000-0740
Buffer overflow in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote malicious users to execute arbitrary commands via a long URL in the HTTPS port.
Network Associates Net Tools Pki Server 1.0
Network Associates Net Tools Pki Server 1.0hotfix1
Network Associates Net Tools Pki Server 1.0hotfix2
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »