Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
storm vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0729
Buffer overflow in Tellurian TftpdNT 1.8 allows remote malicious users to execute arbitrary code via a TFTP request with a long filename.
Tellurian Tftpdnt 1.8
Tellurian Tftpdnt 2.0
1 EDB exploit
7.5
CVSSv2
CVE-2002-1788
Format string vulnerability in the nn_exitmsg function in nn 6.6.0 up to and including 6.6.3 allows remote NNTP servers to execute arbitrary code via format strings in server responses.
Kim Storm Nn 6.6.3
Kim Storm Nn 6.6.0
Kim Storm Nn 6.6.2
Kim Storm Nn 6.6.1
7.2
CVSSv2
CVE-2019-12777
An issue exists on the ENTTEC Datagate MK2, Storm 24, Pixelator, and E-Streamer MK2 with firmware 70044_update_05032019-482. They replace secure and protected directory permissions (set as default by the underlying operating system) with highly insecure read, write, and execute d...
Enttec Datagate Mk2 Firmware 70044
Enttec Storm 24 Firmware 70044
Enttec Pixelator Firmware 70044
Enttec E-streamer Mk2 Firmware 70044
7.2
CVSSv2
CVE-2002-0479
Gravity Storm Service Pack Manager 2000 creates a hidden share (SPM2000c$) mapped to the C drive, which may allow local users to bypass access restrictions on certain directories in the C drive, such as system32, by accessing them through the hidden share.
Gravity Storm Software Service Pack Manager 2000 6.0
Gravity Storm Software Service Pack Manager 2000 6.3
Gravity Storm Software Service Pack Manager 2000 6.1
7.1
CVSSv2
CVE-2007-4011
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software prior to 3.2 20070727, 4.0 prior to 20070727, and 4.1 prior to 4.1.180.0 allows remote malicious users to cause a denial of service (traffic amplification or ARP storm) via a cr...
Cisco Wireless Lan Controller Software 3.2.116.21
Cisco Wireless Lan Controller Software 4.0
Cisco Wireless Lan Controller Software 4.0.155.0
Cisco Wireless Lan Controller Software 4.1
Cisco Wireless Lan Controller Software 3.2
7.1
CVSSv2
CVE-2007-4012
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software 4.1 prior to 4.1.180.0 allows remote malicious users to cause a denial of service (ARP storm) via a broadcast ARP packet that "targets the IP address of a known client cont...
Cisco Wireless Lan Controller Software 4.1
Cisco Wireless Lan Controller Software 4.0
Cisco Wireless Lan Controller Software 4.0.155.0
Cisco Wireless Lan Controller Software 3.2
Cisco Wireless Lan Controller Software 3.2.116.21
6.9
CVSSv2
CVE-2010-5236
Untrusted search path vulnerability in Roxio Easy Media Creator Home 9.0.136 allows local users to gain privileges via a Trojan horse homeutils9.dll file in the current working directory, as demonstrated by a directory that contains a .roxio, .c2d, or .gi file. NOTE: some of thes...
Roxio Easy Media Creator 9.0.136
1 EDB exploit
6.9
CVSSv2
CVE-2010-5195
Untrusted search path vulnerability in Roxio MyDVD 9 allows local users to gain privileges via a Trojan horse HomeUtils9.dll file in the current working directory, as demonstrated by a directory that contains a .dmsd or .dmsm file. NOTE: some of these details are obtained from th...
Roxio Mydvd 9
1 EDB exploit
6.5
CVSSv2
CVE-2018-1331
In Apache Storm 0.10.0 up to and including 0.10.2, 1.0.0 up to and including 1.0.6, 1.1.0 up to and including 1.1.2, and 1.2.0 up to and including 1.2.1, an attacker with access to a secure storm cluster in some cases could execute arbitrary code as a different user.
Apache Storm
6.4
CVSSv2
CVE-2008-0408
HTTP File Server (HFS) prior to 2.2c allows remote malicious users to append arbitrary text to the log file by using the base64 representation of this text during HTTP Basic Authentication.
Hfs Http File Server
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »