Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cvs vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2000-0338
Concurrent Versions Software (CVS) uses predictable temporary file names for locking, which allows local users to cause a denial of service by creating the lock directory before it is created for use by a legitimate CVS user.
Concurrent Versions Software Project Concurrent Versions Software -
1 EDB exploit
454
VMScore
CVE-2017-12836
CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote malicious users to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
Gnu Cvs 1.12.12
Gnu Cvs 1.12.6
Gnu Cvs 1.12.3
Gnu Cvs 1.12.11
Gnu Cvs 1.12.10
Gnu Cvs 1.12.9
Gnu Cvs 1.12.7
Gnu Cvs 1.12.13
Gnu Cvs 1.12.5
Gnu Cvs 1.12.1
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Debian Debian Linux 9.0
Debian Debian Linux 8.0
454
VMScore
CVE-2005-2972
Multiple stack-based buffer overflows in the RTF import feature in AbiWord prior to 2.2.11 allow user-assisted malicious users to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) H...
Abisource Community Abiword
445
VMScore
CVE-2020-2324
Jenkins CVS Plugin 2.16 and previous versions does not configure its XML parser to prevent XML external entity (XXE) attacks.
Jenkins Cvs
445
VMScore
CVE-2010-0385
Tor prior to 0.2.1.22, and 0.2.2.x prior to 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote malicious users to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query.
Tor Tor 0.2.1.1.12
Tor Tor 0.2.1.1.13
Tor Tor 0.2.1.1.14
Tor Tor 0.2.1.1.15
Tor Tor 0.2.1.1.16
Tor Tor 0.0.6.2
Tor Tor 0.0.6.1
Tor Tor 0.0.6
Tor Tor 0.0.5
Tor Tor 0.0.9.6
Tor Tor 0.0.9.7
Tor Tor 0.0.9.4
Tor Tor 0.0.9.5
Tor Tor 0.1.1
Tor Tor 0.0.2 Pre18
Tor Tor 0.0.2 Pre19
Tor Tor 0.2.1.1.21
Tor Tor 0.0.9
Tor Tor 0.0.8.1
Tor Tor 0.0.8
Tor Tor 0.0.2 Pre25
Tor Tor 0.1.0.13
445
VMScore
CVE-2010-0383
Tor prior to 0.2.1.22, and 0.2.2.x prior to 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle malicious users to compromise the anonymity of traffic sources and destinations.
Tor Tor 0.2.1.1.13
Tor Tor 0.2.1.1.14
Tor Tor 0.2.1.1.21
Tor Tor 0.0.9
Tor Tor 0.0.6.1
Tor Tor 0.0.6
Tor Tor 0.1.0.13
Tor Tor 0.1.0.14
Tor Tor 0.0.9.6
Tor Tor 0.0.9.7
Tor Tor 0.1.2.13
Tor Tor 0.1.2.10
Tor Tor 0.1.1
Tor Tor 0.0.2 Pre18
Tor Tor 0.0.2 Pre16
Tor Tor 0.0.2
Tor Tor 0.1.1.8
Tor Tor 0.1.1.8 Alpha
Tor Tor 0.1.1.4
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.0.6
Tor Tor 0.1.0.16
445
VMScore
CVE-2009-2426
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x prior to 0.2.0.35 and 0.1.x prior to 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via un...
Tor Tor 0.1.0.15
Tor Tor 0.1.0.18
Tor Tor 0.1.0.9
Tor Tor 0.1.0.2
Tor Tor 0.1.1.10 Alpha
Tor Tor 0.1.1.11
Tor Tor 0.1.1.2
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.1.7
Tor Tor 0.1.1.6 Alpha
Tor Tor 0.1.1.5
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.2.4
Tor Tor 0.1.2.5
Tor Tor 0.2.0.15
Tor Tor 0.2.0.1
Tor Tor 0.2.0.2
Tor Tor 0.2.0.21
Tor Tor 0.2.0.20
Tor Tor 0.2.0.27
Tor Tor 0.2.0.4
Tor Tor 0.2.0.9
445
VMScore
CVE-2007-4436
The Drupal Project module prior to 5.x-1.0, 4.7.x-2.3, and 4.7.x-1.3 and Project issue tracking module prior to 5.x-1.0, 4.7.x-2.4, and 4.7.x-1.4 do not properly enforce permissions, which allows remote malicious users to (1) obtain sensitive via the Tracker Module and the Recent...
Drupal Project
Drupal Project Issue Tracking Module
445
VMScore
CVE-2007-3165
Tor prior to 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers.
Tor Tor 0.0.9.2
Tor Tor 0.0.9.3
Tor Tor 0.1.0.11
Tor Tor 0.1.0.12
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.0.9.1
Tor Tor 0.0.9.10
Tor Tor 0.0.9.8
Tor Tor 0.0.9.9
Tor Tor 0.1.0.10
Tor Tor 0.1.1.20
Tor Tor 0.1.1.23
Tor Tor 0.0.9.4
Tor Tor 0.0.9.5
Tor Tor 0.1.0.13
Tor Tor 0.1.0.14
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.0.9
Tor Tor 0.0.9.6
Tor Tor 0.0.9.7
445
VMScore
CVE-2006-6227
The Core::Receive function in neonet/core.cpp for NeoEngine 0.8.2 and previous versions, and CVS 3422, allow remote malicious users to cause a denial of service (engine crash) via a message with a large uiMessageLength that produces a failed memory allocation and a null pointer d...
Neoengine Neoengine 0.8.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »