Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
chris anley vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0265
ASCII Armor parser in Windows PGP 7.0.3 and previous versions allows malicious users to create files in arbitrary locations via a malformed ASCII armored file.
Pgp Pgp
Pgp Pgp 5
1 EDB exploit
7.1
CVSSv3
CVE-2005-4868
Shared memory sections and events in IBM DB2 8.1 have default permissions of read and write for the Everyone group, which allows local users to gain unauthorized access, gain sensitive information, such as cleartext passwords, and cause a denial of service.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1
1 EDB exploit
NA
CVE-2005-4869
The (1) to_char and (2) to_date function in IBM DB2 8.1 allows local users to cause a denial of service (application crash) via an empty string in the second parameter, which causes a null pointer dereference.
Ibm Db2 8.1
1 EDB exploit
NA
CVE-2007-0753
Format string vulnerability in the VPN daemon (vpnd) in Apple Mac OS X 10.3.9 and 10.4.9 allows local users to execute arbitrary code via the -i parameter.
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X 10.4.1
Apple Mac Os X 10.4.2
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.4.6
Apple Mac Os X Server 10.4.7
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X 10.3.9
Apple Mac Os X 10.4
Apple Mac Os X 10.4.8
Apple Mac Os X 10.4.9
Apple Mac Os X Server 10.3.6
Apple Mac Os X Server 10.3.7
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.4.5
Apple Mac Os X 10.3
Apple Mac Os X 10.3.7
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started