Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ghost ghost vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-0306
Symantec Ghost Solution Suite 2.x up to and including 2.5.1 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted backup file.
Symantec Ghost Solutions Suite 2.5
Symantec Ghost Solutions Suite 2.0.0
Symantec Ghost Solutions Suite 2.0.1
Symantec Ghost Solutions Suite 2.0
NA
CVE-2012-1570
The resolver in MaraDNS prior to 1.3.0.7.15 and 1.4.x prior to 1.4.12 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain nam...
Maradns Maradns
NA
CVE-2012-1192
The resolver in Unbound prior to 1.4.11 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain names via a "ghost domain na...
Unbound Unbound
Unbound Unbound 1.4.9
Unbound Unbound 1.4.8
Unbound Unbound 1.4.7
Unbound Unbound 1.2.0
Unbound Unbound 1.1.1
Unbound Unbound 1.1.0
Unbound Unbound 1.0.2
Unbound Unbound 0.3
Unbound Unbound 0.2
Unbound Unbound 0.1
Unbound Unbound 0.0
Unbound Unbound 1.4.5
Unbound Unbound 1.4.3
Unbound Unbound 1.3.1
Unbound Unbound 1.2.1
Unbound Unbound 1.0.1
Unbound Unbound 0.11
Unbound Unbound 0.6
Unbound Unbound 0.4
Unbound Unbound 1.4.2
Unbound Unbound 1.4.1
NA
CVE-2012-1191
The resolver in dnscache in Daniel J. Bernstein djbdns 1.05 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain names via a &...
D.j.bernstein Djbdns 1.05
4 Github repositories
NA
CVE-2012-1193
The resolver in PowerDNS Recursor (aka pdns_recursor) 3.3 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain names via a &qu...
Powerdns Powerdns Recursor 3.3
NA
CVE-2012-1194
The resolver in the DNS Server service in Microsoft Windows Server 2008 before R2 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoke...
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008
NA
CVE-2012-1033
The resolver in ISC BIND 9 up to and including 9.8.1-P1 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote malicious users to trigger continued resolvability of revoked domain names via a "...
Isc Bind 9.7.1
Isc Bind 9.7.3
Isc Bind 9.5.1
Isc Bind 9.6.0
Isc Bind 9.5.0
Isc Bind 9.2.1
Isc Bind 9.2.2
Isc Bind 9.0
Isc Bind 9.0.1
Isc Bind 9.7.2
Isc Bind 9.3
Isc Bind 9.2.7
Isc Bind 9.2.6
Isc Bind 9.4.1
Isc Bind 9.8.0
Isc Bind 9.8.1
Isc Bind 9.7.4
Isc Bind 9.1
Isc Bind 9.7.0
Isc Bind 9.4
Isc Bind 9.2.5
Isc Bind 9.5
NA
CVE-2010-3242
Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote malicious users to execute arbitrary code via a crafted Excel document, aka "Ghost Record Type Parsing Vulnerab...
Microsoft Excel 2002
Microsoft Office 2004
Microsoft Office 2008
Microsoft Open Xml File Format Converter
NA
CVE-2010-1066
AR Web Content Manager (AWCM) 2.1 stores sensitive information under the web root with insufficient access control, which allows remote malicious users to download a database via a direct request for control/db_backup.php.
The-ghost Ar Web Content Manager 2.1
1 EDB exploit
NA
CVE-2009-3218
SQL injection vulnerability in control/login.php in AR Web Content Manager (AWCM) 2.1, when magic_quotes_gpc is disabled, allows remote malicious users to execute arbitrary SQL commands via the username parameter.
The-ghost Ar Web Content Manager 2.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »