Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
server message block vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-0056
Multiple vulnerabilities in the H.323 protocol implementation for Nortel Networks Business Communications Manager (BCM), Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless IP Gateway allow remote malicious users to cause a denial of service and possibly execute ...
Nortel 802.11 Wireless Ip Gateway
Nortel Business Communications Manager
Nortel Succession Communication Server 1000
10
CVSSv2
CVE-2002-1318
Buffer overflow in samba 2.2.2 up to and including 2.2.6 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-end...
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.18
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Samba Samba 2.2.4
Samba Samba 2.2.5
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Samba Samba 2.2.6
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Samba Samba 2.2.2
Samba Samba 2.2.3
Sgi Irix 6.5.11
Sgi Irix 6.5.12
9.3
CVSSv2
CVE-2017-0146
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote malicious users to execute arbitrary code v...
Microsoft Server Message Block 1.0
4 EDB exploits
2 Articles
10
CVSSv2
CVE-2003-0201
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x prior to 2.2.8a, 2.0.10 and previous versions 2.0.x versions, and Samba-TNG prior to 0.3.2, allows remote malicious users to execute arbitrary code.
Samba Samba 2.0.3
Samba Samba 2.0.4
Samba Samba 2.2.1a
Samba Samba 2.2.3a
Samba Samba 2.0.10
Samba Samba 2.0.2
Samba Samba 2.2.0
Samba Samba 2.2.0a
Samba Samba 2.2.7a
Samba Samba 2.2.8
Samba-tng Samba-tng 0.3
Samba-tng Samba-tng 0.3.1
Samba Samba 2.0.5
Samba Samba 2.0.6
Samba Samba 2.0.7
Samba Samba 2.2.4
Samba Samba 2.2.5
Samba Samba 2.0.0
Samba Samba 2.0.1
Samba Samba 2.0.8
Samba Samba 2.0.9
Samba Samba 2.2.6
12 EDB exploits
3 Github repositories
10
CVSSv2
CVE-2003-0819
Buffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote malicious users to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 ...
Microsoft Proxy Server 2.0
4.3
CVSSv2
CVE-2016-7103
Cross-site scripting (XSS) vulnerability in jQuery UI prior to 1.12.0 might allow remote malicious users to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
Jqueryui Jquery Ui
Oracle Weblogic Server 12.1.3.0.0
Oracle Weblogic Server 10.3.6.0.0
Oracle Weblogic Server 12.2.1.3.0
Oracle Business Intelligence 12.2.1.3.0
Oracle Business Intelligence 12.2.1.4.0
Oracle Hospitality Cruise Fleet Management 9.0.11
Oracle Application Express
Oracle Primavera Unifier
Oracle Siebel Ui Framework
Oracle Oss Support Tools
Oracle Oss Support Tools 2.12.42
Fedoraproject Fedora 30
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Netapp Snapcenter -
Redhat Openstack 7.0
Redhat Openstack 9
Redhat Openstack 8
Juniper Junos 21.2
Debian Debian Linux 9.0
7.5
CVSSv2
CVE-2002-1486
Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221&qu...
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.73
Cerulean Studios Trillian 0.74
5 EDB exploits
4.3
CVSSv2
CVE-2012-0876
The XML parser (xmlparse.c) in expat prior to 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via an XML file with many identifiers wit...
Libexpat Project Libexpat
Python Python
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Oracle Solaris 11.3
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Storage 2.0
Redhat Enterprise Linux Eus 6.2
5
CVSSv2
CVE-2004-0634
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote malicious users to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
7.5
CVSSv2
CVE-2016-0718
Expat allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
Mozilla Firefox
Apple Mac Os X
Suse Linux Enterprise Server 11
Suse Studio Onsite 1.3
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Debuginfo 11
Opensuse Leap 42.1
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Libexpat Project Libexpat
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mcafee Policy Auditor
Python Python
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »