Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
marco ivaldi vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-10149
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Exim Exim
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
3 EDB exploits
14 Github repositories
2 Articles
NA
CVE-2006-2451
The suid_dumpable support in Linux kernel 2.6.13 up to versions prior to 2.6.17.4, and 2.6.16 prior to 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program ...
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.16.18
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.6.16.13
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.17.3
Linux Linux Kernel 2.6.16.15
Linux Linux Kernel 2.6.15.6
Linux Linux Kernel 2.6.15.1
5 EDB exploits
NA
CVE-2006-4655
Buffer overflow in the Strcmp function in the XKEYBOARD extension in X Window System X11R6.4 and previous versions, as used in SCO UnixWare 7.1.3 and Sun Solaris 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment variable value.
Sun Solaris 9.0
Sco Unixware 7.1.3
Sun Solaris 10.0
Sun Solaris 8.0
4 EDB exploits
NA
CVE-2006-0745
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepa...
X.org X11r7 1.0
X.org X11r7 1.0.1
X.org X11r6 6.9
Mandrakesoft Mandrake Linux 2006
Redhat Fedora Core Core 5.0
Sun Solaris 10.0
Suse Suse Linux 10.0
1 EDB exploit
NA
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
9.8
CVSSv3
CVE-2020-7247
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote malicious users to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncomm...
Openbsd Opensmtpd 6.6
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
9 Github repositories
1 Article
NA
CVE-2010-3847
elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) up to and including 2.11.2, and 2.12.x up to and including 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
4 EDB exploits
1 Github repository
NA
CVE-2010-3856
ld.so in the GNU C Library (aka glibc or libc6) prior to 2.11.3, and 2.12.x prior to 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging ...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
3 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7