Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paul vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-5662
x3270 prior to 3.3.12ga12 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitrary valid certificate...
Paul Mattes X3270 3.3.11
Paul Mattes X3270 3.3.8
Paul Mattes X3270
Paul Mattes X3270 3.3.12
Paul Mattes X3270 3.3.10
Paul Mattes X3270 3.3.9
Paul Mattes X3270 3.3.6
Paul Mattes X3270 3.3.5
Paul Mattes X3270 3.3.7
NA
CVE-2008-7069
All Club CMS (ACCMS) 0.0.2 and previous versions stores sensitive information under the web root with insufficient access control, which allows remote malicious users to obtain database configuration information, including credentials, via a direct request to accms.dat.
Paul Arbogast Accms 0.0.1c
Paul Arbogast Accms 0.0.1a
Paul Arbogast Accms
Paul Arbogast Accms 0.0.1h
Paul Arbogast Accms 0.0.1f
Paul Arbogast Accms 0.0.1g
Paul Arbogast Accms 0.0.1d
Paul Arbogast Accms 0.0.1e
1 EDB exploit
NA
CVE-2004-2619
ripMIME 1.3.2.3 and previous versions allows remote malicious users to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted.
Paul L Daniels Ripmime 1.2.0
Paul L Daniels Ripmime 1.2.7
Paul L Daniels Ripmime 1.3.2.0
Paul L Daniels Ripmime 1.2.1
Paul L Daniels Ripmime 1.2.2
Paul L Daniels Ripmime 1.3.2.2
Paul L Daniels Ripmime
Paul L Daniels Ripmime 1.2.5
Paul L Daniels Ripmime 1.2.6
Paul L Daniels Ripmime 1.2.3
Paul L Daniels Ripmime 1.2.4
NA
CVE-2002-0198
Buffer overflow in plDaniels ripMime 1.2.6 and previous versions, as used in other programs such as xamime and inflex, allows remote malicious users to execute arbitrary code via an attachment in a long filename.
Paul L Daniels Ripmime 1.2.2
Paul L Daniels Ripmime 1.2.3
Paul L Daniels Inflex 1.0.10
Paul L Daniels Ripmime 1.2.0
Paul L Daniels Ripmime 1.2.1
Paul L Daniels Ripmime 1.2.4
Paul L Daniels Ripmime 1.2.5
Paul L Daniels Ripmime 1.2.6
NA
CVE-2009-1391
Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module prior to 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent malicious users to cause a denial of service (hang or crash) via a crafted zlib compressed...
Paul Marquess Compress-raw-zlib Perl Module 2.008
Paul Marquess Compress-raw-zlib Perl Module 2.006
Paul Marquess Compress-raw-zlib Perl Module 2.001
Paul Marquess Compress-raw-zlib Perl Module
Paul Marquess Compress-raw-zlib Perl Module 2.005
Paul Marquess Compress-raw-zlib Perl Module 2.004
Paul Marquess Compress-raw-zlib Perl Module 2.014
Paul Marquess Compress-raw-zlib Perl Module 2.012
Paul Marquess Compress-raw-zlib Perl Module 2.011
Paul Marquess Compress-raw-zlib Perl Module 2.003
Paul Marquess Compress-raw-zlib Perl Module 2.002
Paul Marquess Compress-raw-zlib Perl Module 2.010
Paul Marquess Compress-raw-zlib Perl Module 2.009
1 EDB exploit
NA
CVE-2002-1742
SOAP::Lite 0.50 up to and including 0.52 allows remote malicious users to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.
Paul Kulchenko Soap Lite 0.51
Paul Kulchenko Soap Lite 0.52
Paul Kulchenko Soap Lite 0.50
NA
CVE-2013-4314
The X509Extension in pyOpenSSL prior to 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafted certifica...
Jean-paul Calderone Pyopenssl 0.11
Jean-paul Calderone Pyopenssl 0.10
Jean-paul Calderone Pyopenssl 0.9
Jean-paul Calderone Pyopenssl 0.8
Jean-paul Calderone Pyopenssl
Jean-paul Calderone Pyopenssl 0.12
Jean-paul Calderone Pyopenssl 0.7
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.10
NA
CVE-2004-0051
Multiple content security gateway and antivirus products allow remote malicious users to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may b...
Clearswift Mailsweeper 4.3.14
Clearswift Mailsweeper 4.3.15
Paul L Daniels Ripmime 1.2.1
Paul L Daniels Ripmime 1.2.2
Paul L Daniels Ripmime 1.3.2.2
Paul L Daniels Ripmime 1.3.2.3
Clearswift Mailsweeper 4.3.7
Clearswift Mailsweeper 4.3.8
F-secure Internet Gatekeeper 6.3
Paul L Daniels Ripmime 1.2.3
Paul L Daniels Ripmime 1.2.4
Clearswift Mailsweeper 4.3.10
F-secure Internet Gatekeeper 6.31
F-secure Internet Gatekeeper 6.32
Paul L Daniels Ripmime 1.2.5
Paul L Daniels Ripmime 1.2.6
Clearswift Mailsweeper 4.3.11
Clearswift Mailsweeper 4.3.13
F-secure Internet Gatekeeper 6.4
Paul L Daniels Ripmime 1.2.0
Paul L Daniels Ripmime 1.2.7
Paul L Daniels Ripmime 1.3.2.0
NA
CVE-2004-0052
Multiple content security gateway and antivirus products allow remote malicious users to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may...
Clearswift Mailsweeper 4.3.10
F-secure Internet Gatekeeper 6.3
F-secure Internet Gatekeeper 6.31
F-secure Internet Gatekeeper 6.32
Paul L Daniels Ripmime 1.2.5
Paul L Daniels Ripmime 1.2.6
Clearswift Mailsweeper 4.3.11
Clearswift Mailsweeper 4.3.13
F-secure Internet Gatekeeper 6.4
Paul L Daniels Ripmime 1.2.0
Paul L Daniels Ripmime 1.2.7
Paul L Daniels Ripmime 1.3.2.0
Clearswift Mailsweeper 4.3.7
Clearswift Mailsweeper 4.3.8
Paul L Daniels Ripmime 1.2.3
Paul L Daniels Ripmime 1.2.4
Clearswift Mailsweeper 4.3.14
Clearswift Mailsweeper 4.3.15
Paul L Daniels Ripmime 1.2.1
Paul L Daniels Ripmime 1.2.2
Paul L Daniels Ripmime 1.3.2.2
Paul L Daniels Ripmime 1.3.2.3
NA
CVE-2004-0053
Multiple content security gateway and antivirus products allow remote malicious users to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients.
Clearswift Mailsweeper 4.3.11
Clearswift Mailsweeper 4.3.13
F-secure Internet Gatekeeper 6.4
Paul L Daniels Ripmime 1.2.0
Paul L Daniels Ripmime 1.2.7
Paul L Daniels Ripmime 1.3.2.0
Clearswift Mailsweeper 4.3.14
Clearswift Mailsweeper 4.3.15
Paul L Daniels Ripmime 1.2.1
Paul L Daniels Ripmime 1.2.2
Paul L Daniels Ripmime 1.3.2.2
Paul L Daniels Ripmime 1.3.2.3
Clearswift Mailsweeper 4.3.10
F-secure Internet Gatekeeper 6.3
F-secure Internet Gatekeeper 6.31
F-secure Internet Gatekeeper 6.32
Paul L Daniels Ripmime 1.2.5
Paul L Daniels Ripmime 1.2.6
Clearswift Mailsweeper 4.3.7
Clearswift Mailsweeper 4.3.8
Paul L Daniels Ripmime 1.2.3
Paul L Daniels Ripmime 1.2.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »