Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
derek soeder vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-1206
The Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0; 2000 SP4; XP SP2; Server 2003, 2003 SP1, and 2003 SP2; and Windows Vista before June 2006; uses insecure permissions (PAGE_READWRITE) for a physical memory view, which allows local users to gain priv...
Microsoft Windows 2000
Microsoft Windows 2003 Server Gold
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2003 Server Sp2
Microsoft Windows Xp
NA
CVE-2012-1515
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 3.5
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
9.9
CVSSv3
CVE-2012-1516
The VMX process in VMware ESXi 3.5 up to and including 4.1 and ESX 3.5 up to and including 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS vi...
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 3.5
NA
CVE-2007-1749
Integer underflow in the CDownloadSink class code in the Vector Markup Language (VML) component (VGX.DLL), as used in Internet Explorer 5.01, 6, and 7 allows remote malicious users to execute arbitrary code via compressed content with an invalid buffer size, which triggers a heap...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
1 EDB exploit
NA
CVE-2010-0232
The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, d...
Microsoft Windows Nt 3.1
Microsoft Windows Server 2008 -
Microsoft Windows Xp -
Microsoft Windows Server 2008 Sp2
Microsoft Windows Vista
Microsoft Windows 7 -
Microsoft Windows Server 2008
Microsoft Windows 2000 Sp4
Microsoft Windows Xp Sp3
Microsoft Windows Server 2003
Microsoft Windows Vista Sp1
Microsoft Windows Vista Sp2
1 EDB exploit
3 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started