Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
iss vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2001-0717
Format string vulnerability in ToolTalk database server rpc.ttdbserverd allows remote malicious users to execute arbitrary commands via format string specifiers that are passed to the syslog function.
Tooltalk Tooltalk Database Server
570
VMScore
CVE-2006-2827
SQL injection vulnerability in search.php in X-Cart Gold and Pro 4.0.18, and X-Cart 4.1.0 beta 1, allows remote malicious users to execute arbitrary SQL commands via the "Search for pattern" field, when the settings specify only "Search in Detailed description"...
Qualiteam X-cart 4.1.0 Beta 1
Qualiteam X-cart Gold 4.0.18
Qualiteam X-cart Pro 4.0.18
NA
CVE-2024-35785
In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix kernel panic caused by incorrect error handling The error path while failing to register devices on the TEE bus has a bug leading to kernel panic as follows: [ 15.398930] Unable to handle kernel p...
890
VMScore
CVE-2001-0353
Buffer overflow in the line printer daemon (in.lpd) for Solaris 8 and previous versions allows local and remote malicious users to gain root privileges via a "transfer job" routine.
Sun Sunos 5.7
Sun Solaris 7.0
Sun Sunos 5.8
Sun Solaris 8.0
Sun Solaris 2.6
Sun Sunos -
NA
CVE-2021-47047
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails The spi controller supports 44-bit address space on AXI in DMA mode, so set dma_addr_t width to 44-bit to avoid using a swiotlb mapping. In addition, ...
1000
VMScore
CVE-2001-0803
Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote malicious users to execute arbitrary commands.
Open Group Cde Common Desktop Environment 1.0.1
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 1.1
2 EDB exploits
890
VMScore
CVE-2004-0039
Multiple format string vulnerabilities in HTTP Application Intelligence (AI) component in Check Point Firewall-1 NG-AI R55 and R54, and Check Point Firewall-1 HTTP Security Server included with NG FP1, FP2, and FP3 allows remote malicious users to execute arbitrary code via HTTP ...
Checkpoint Firewall-1
668
VMScore
CVE-2004-0699
Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote malicious users to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.
Checkpoint Firewall-1 4.1
Checkpoint Vpn-1
1000
VMScore
CVE-2002-1337
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote malicious users to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
Sendmail Sendmail
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Hp Hp-ux 11.11
Netbsd Netbsd 1.5
Windriver Bsdos 4.2
Sun Sunos 5.7
Sun Sunos 5.8
Gentoo Linux 1.4
Hp Hp-ux 11.00
Windriver Bsdos 5.0
Netbsd Netbsd 1.5.1
Hp Hp-ux 11.0.4
Oracle Solaris 8
Hp Hp-ux 11.22
Netbsd Netbsd 1.5.2
Oracle Solaris 9
Hp Alphaserver Sc
Hp Hp-ux 10.20
Windriver Platform Sa 1.0
Hp Hp-ux 10.10
Windriver Bsdos 4.3.1
3 EDB exploits
1 Github repository
NA
CVE-2021-47413
In the Linux kernel, the following vulnerability has been resolved: usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle When passing 'phys' in the devicetree to describe the USB PHY phandle (which is the recommended way according to Documentation/device...
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »