Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
metasploit vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2012-5159
phpMyAdmin 3.5.2.2, as distributed by the cdnetworks-kr-1 mirror during an unspecified time frame in 2012, contains an externally introduced modification (Trojan Horse) in server_sync.php, which allows remote malicious users to execute arbitrary PHP code via an eval injection att...
Phpmyadmin Phpmyadmin 3.5.2.2
1 EDB exploit
7.2
CVSSv2
CVE-2005-2373
Buffer overflow in SlimFTPd 3.15 and 3.16 allows remote authenticated users to execute arbitrary code via a long directory name to (1) LIST, (2) DELE or (3) RNFR commands.
Whitsoft Development Slimftpd 3.15
Whitsoft Development Slimftpd 3.16
1 EDB exploit
7.5
CVSSv2
CVE-2006-3524
Buffer overflow in SIPfoundry sipXtapi released prior to 20060324 allows remote malicious users to execute arbitrary code via a long CSeq field value in an INVITE message.
Sipfoundry Sipxtapi
4 EDB exploits
7.5
CVSSv2
CVE-2005-3155
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote malicious users to execute arbitrary code.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.6
2 EDB exploits
10
CVSSv2
CVE-2002-1359
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote malicious users to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
Cisco Ios 12.2s
Cisco Ios 12.2t
Cisco Ios 12.1e
Cisco Ios 12.1ea
Cisco Ios 12.0s
Cisco Ios 12.0st
Cisco Ios 12.1t
Cisco Ios 12.2
Putty Putty 0.53
Winscp Winscp 2.0.0
Netcomposite Shellguard Ssh 3.4.6
Pragma Systems Secureshell 2.0
Fissh Ssh Client 1.0a For Windows
Intersoft Securenetterm 5.4.1
Putty Putty 0.48
Putty Putty 0.49
2 EDB exploits
10
CVSSv2
CVE-2008-1661
Stack-based buffer overflow in DoubleTake.exe in HP StorageWorks Storage Mirroring (SWSM) prior to 4.5 SP2 allows remote malicious users to execute arbitrary code via a crafted encoded authentication request.
Hp Storageworks Storage Mirroring 4.5
2 EDB exploits
9.3
CVSSv2
CVE-2007-5244
Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 up to and including 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote malicious users to execute arbitrary code via a long attach request on TCP port 3050 to the open_marker_file function.
Borland Software Interbase Li 8.0.0.253
Borland Software Interbase Li 8.0.0.53
Borland Software Interbase Li 8.0.0.54
2 EDB exploits
10
CVSSv2
CVE-2004-0541
Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote malicious users to execute arbitrary code via a long password ("pass" variable).
National Science Foundation Squid Web Proxy Cache 2.5 Stable
National Science Foundation Squid Web Proxy Cache 3 Pre
2 EDB exploits
10
CVSSv2
CVE-2013-6810
The server in Brocade Network Advisor prior to 12.1.0, as used in EMC Connectrix Manager Converged Network Edition (CMCNE), HP B-series SAN Network Advisor, and possibly other products, allows remote malicious users to execute arbitrary code by using a servlet to upload an execut...
Emc Connectrix Manager 11.2.1
Emc Connectrix Manager 12.0.1
Emc Connectrix Manager 12.0.3
2 EDB exploits
10
CVSSv2
CVE-2006-3838
Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) prior to 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and ...
Eiqnetworks Enterprise Security Analyzer
6 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »