Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
name server daemon vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2007-0957
Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 prior to 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerb...
Mit Kerberos 5
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
5
CVSSv2
CVE-2006-4095
BIND prior to 9.2.6-P1 and 9.3.x prior to 9.3.2-P1 allows remote malicious users to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.
Isc Bind
Canonical Ubuntu Linux 5.04
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Apple Mac Os X Server
Apple Mac Os X
4.6
CVSSv2
CVE-2005-2496
The xntpd ntp (ntpd) daemon prior to 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.
Dave Mills Ntpd
7.5
CVSSv2
CVE-2005-0357
EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 up to and including 7.2 rely on AUTH_UNIX authentication, which relies on user ID for authentication and allows remote malicious users to bypass authentication and gain privileges by spoofin...
Emc Legato Networker 4.2.2
Sun Storedge Enterprise Backup Software 7.0
Sun Storedge Enterprise Backup Software 7.1
Emc Legato Networker 7.13
Emc Legato Networker 7.2
Sun Solstice Backup 6.0
Sun Solstice Backup 6.1
Emc Legato Networker 6.0
Emc Legato Networker 6.1
Sun Storedge Enterprise Backup Software 7.2
10
CVSSv2
CVE-2005-1256
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
Ipswitch Imail 8.13
Ipswitch Ipswitch Collaboration Suite
Ipswitch Imail Server
5
CVSSv2
CVE-2004-0799
The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote malicious users to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm".
Ipswitch Whatsup Gold 7.0
Ipswitch Whatsup Gold 8.03
Ipswitch Whatsup Gold 8.03 Hotfix 1
Ipswitch Whatsup Gold 8.0
Ipswitch Whatsup Gold 8.01
Ipswitch Whatsup Gold 7.03
Ipswitch Whatsup Gold 7.04
5
CVSSv2
CVE-2003-0027
Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote malicious users to read arbitrary files via the KCS_OPEN_PROFILE procedure.
Sun Sunos 5.7
Sun Solaris 7.0
Sun Sunos 5.8
Sun Solaris 8.0
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 9.0
Sun Solaris 2.6
Sun Sunos -
7.5
CVSSv2
CVE-2002-0511
The default configuration of Name Service Cache Daemon (nscd) in Caldera OpenLinux 3.1 and 3.1.1 uses cached PTR records instead of consulting the authoritative DNS server for the A record, which could make it easier for remote malicious users to bypass applications that restrict...
Nscd Nscd 2.2.4
10
CVSSv2
CVE-2002-0033
Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote malicious users to execute arbitrary code via a request with a long directory and cache name.
Sun Solaris 8.0
Sun Solaris 7.0
Sun Solaris 2.5.1
Sun Solaris 2.6
Sun Sunos -
1 EDB exploit
7.2
CVSSv2
CVE-2002-0084
Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument.
Sun Solaris 8.0
Sun Solaris 2.6
Sun Sunos 5.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »