Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
andres tarasco vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-1644
The dynamic DNS update mechanism in the DNS Server service on Microsoft Windows does not properly authenticate clients in certain deployments or configurations, which allows remote malicious users to change DNS records for a web proxy server and conduct man-in-the-middle (MITM) a...
Microsoft All Windows Abstract Cpe
1 EDB exploit
NA
CVE-2007-2221
Unspecified vulnerability in the mdsauth.dll COM object in Microsoft Windows Media Server in the Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4; 6 SP1 on Windows 2000 SP4; 6 and 7 on Windows XP SP2, or Windows Server 2003 SP1 or SP2; or 7 on Windows Vista allows remote ...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7.0
1 EDB exploit
NA
CVE-2006-4676
TIBCO RendezVous 7.4.11 and previous versions logs base64-encoded usernames and passwords in rvrd.db, which allows local users to obtain sensitive information by decoding the log file.
Tibco Rendezvous
1 EDB exploit
NA
CVE-2007-0444
Stack-based buffer overflow in the print provider library (cpprov.dll) in Citrix Presentation Server 4.0, MetaFrame Presentation Server 3.0, and MetaFrame XP 1.0 allows local users and remote malicious users to execute arbitrary code via long arguments to the (1) EnumPrintersW an...
Citrix Metaframe Presentation Server 4.0
Citrix Metaframe 1.0
Citrix Metaframe Presentation Server 3.0
1 EDB exploit
NA
CVE-2006-5854
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 up to and including 4.91 SP2 allow remote malicious users to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Novell Netware Client 4.91
2 EDB exploits
NA
CVE-2004-0676
Directory traversal vulnerability in Fastream NETFile FTP/Web Server 6.7.2.1085 and previous versions allows remote malicious users to create or delete arbitrary files via .. (dot dot) and // (double slash) sequences in the filename parameter.
Fastream Netfile Ftp Web Server 6.5.1.980
Fastream Netfile Ftp Web Server 6.7.2.1085
Fastream Netfile Ftp Web Server 6.5.1.981
1 EDB exploit
NA
CVE-2007-0641
Buffer overflow in the EnumPrintersA function in dapcnfsd.dll 0.6.4.0 in Shaffer Solutions (SSC) DiskAccess NFS Client allows remote malicious users to execute arbitrary code via a long argument, an issue similar to CVE-2006-5854 and CVE-2007-0444.
Shaffer Solutions Corp Dapcnfsd.dll 0.6.4.0
1 EDB exploit
NA
CVE-2008-4037
Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka ...
Microsoft Windows Server 2003
Microsoft Windows Server 2008 -
Microsoft Windows Xp
Microsoft Windows Vista -
Microsoft Windows 2000 -
3 EDB exploits
NA
CVE-2007-3039
Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows malicious users to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103. NOTE: thi...
Microsoft Message Queuing
4 EDB exploits
NA
CVE-2007-1748
Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote malicious users to execute arbitrary code via a long zone name containing character constant...
Microsoft Windows 2003 Server Sp2
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2000
5 EDB exploits
1 Nmap script
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started