Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
article system vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-25124
Fiber is a web framework written in go. Prior to version 2.52.1, the CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header t...
755
VMScore
CVE-2007-6078
Multiple SQL injection vulnerabilities in SkyPortal RC6 allow remote malicious users to execute arbitrary SQL commands via unspecified parameters to (1) nc_top.asp; (2) inc_bookmarks.asp, possibly involving a parameter passed from cp_main.asp; (3) inc_profile_functions.asp; or (4...
Skyportal Skyportal Rc6
1 EDB exploit
755
VMScore
CVE-2005-3120
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and previous versions allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
Invisible-island Lynx
Debian Debian Linux 3.1
Debian Debian Linux 3.0
1 EDB exploit
935
VMScore
CVE-2007-3896
The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote malicious users to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated usi...
Microsoft Internet Explorer 7.0
1 EDB exploit
668
VMScore
CVE-2006-0057
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to bypass the Kill bit settings for dangerous ActiveX controls via unknown vectors involving crafted HTML, which can expose the browser to attacks that would otherwise be prevented by the Kill bit setting....
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Ie 6
890
VMScore
CVE-2003-0528
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote malicious users to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nac...
Microsoft Windows 2003 Server R2
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
890
VMScore
CVE-2003-0715
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote malicious users to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability t...
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
1000
VMScore
CVE-2020-1472
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2004 -
Microsoft Windows Server 20h2 -
Microsoft Windows Server 1903
Microsoft Windows Server 1909
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Leap 15.1
Opensuse Leap 15.2
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Synology Directory Server
Samba Samba
Debian Debian Linux 9.0
Oracle Zfs Storage Appliance Kit 8.8
1 Metasploit module
160 Github repositories
18 Articles
516
VMScore
CVE-2014-5117
Tor prior to 0.2.4.23 and 0.2.5 prior to 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote malicious users to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a ...
Torproject Tor 0.0.2
Torproject Tor 0.0.3
Torproject Tor 0.0.4
Torproject Tor 0.0.7.2
Torproject Tor 0.0.7.3
Torproject Tor 0.0.9.5
Torproject Tor 0.0.9.6
Torproject Tor 0.1.0.14
Torproject Tor 0.1.0.15
Torproject Tor 0.1.1.24
Torproject Tor 0.1.1.25
Torproject Tor 0.1.2.18
Torproject Tor 0.1.2.19
Torproject Tor 0.2.2.19
Torproject Tor 0.2.2.20
Torproject Tor 0.2.2.27
Torproject Tor 0.2.2.28
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.36
Torproject Tor 0.2.3.17
Torproject Tor 0.2.3.18
Torproject Tor 0.2.4.1
680
VMScore
CVE-2013-3900
The WinVerifyTrust function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate PE file ...
Microsoft Windows Xp -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows 11 -
Microsoft Windows Server 2022 -
Microsoft Windows Server 2019 -
Microsoft Windows 10 -
Microsoft Windows 10 21h2
Microsoft Windows 10 20h2
Microsoft Windows 10 21h1
Microsoft Windows 10 1909
Microsoft Windows 10 1809
Microsoft Windows Server 2012 -
Microsoft Windows Server 2003 -
Microsoft Windows Vista -
14 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »