Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qualys corporation vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2017-1000370
The offset2lib patch as used in the Linux Kernel contains a vulnerability that allows a PIE binary to be execve()'ed with 1GB of arguments or environmental strings then the stack occupies the address 0x80000000 and the PIE binary is mapped above 0x40000000 nullifying the pro...
Linux Linux Kernel
2 EDB exploits
6.4
CVSSv3
CVE-2017-1000367
Todd Miller's sudo version 1.8.20 and previous versions is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
Sudo Project Sudo
1 EDB exploit
3 Github repositories
7.8
CVSSv3
CVE-2017-1000371
The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above ...
Linux Linux Kernel
2 EDB exploits
4.7
CVSSv3
CVE-2020-8793
OpenSMTPD prior to 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.
Opensmtpd Opensmtpd
Fedoraproject Fedora 32
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
1 EDB exploit
1 Github repository
NA
CVE-2002-1042
Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote malicious users to read arbitrary files via ..\ (dot-dot backslash) sequences in the NS-query-pat pa...
Sun Iplanet Web Server 4.1
Netscape Enterprise Server 3.6
Sun One Application Server 6.0
Sun One Web Server 6.0
1 EDB exploit
7.8
CVSSv3
CVE-2017-1000253
Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backpo...
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 7.2
Redhat Enterprise Linux 7.1
Redhat Enterprise Linux 6.7
Redhat Enterprise Linux 7.3
Centos Centos 6.0
Centos Centos 6.1
Centos Centos 6.2
Centos Centos 6.3
Centos Centos 6.4
Centos Centos 6.5
Centos Centos 6.6
Centos Centos 6.7
Centos Centos 6.8
Centos Centos 6.9
Centos Centos 7.1611
Centos Centos 7.1511
Centos Centos 7.1503
Centos Centos 7.1406
Redhat Enterprise Linux 6.1
Redhat Enterprise Linux 6.2
1 EDB exploit
1 Article
7.5
CVSSv3
CVE-2017-1084
In FreeBSD prior to 11.2-RELEASE, multiple issues with the implementation of the stack guard-page reduce the protections afforded by the guard-page. This results in the possibility a poorly written process could be cause a stack overflow.
Freebsd Freebsd
2 EDB exploits
6.5
CVSSv3
CVE-2017-1000373
The OpenBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows malicious users to consume arbitrary amounts of stack memory and manipulate st...
Openbsd Openbsd
1 EDB exploit
9.8
CVSSv3
CVE-2017-1000375
NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows malicious users to more easily manipulate memory leading to arbitrary code execution. This affects NetBSD 7.1 and possibly earlier versions.
Netbsd Netbsd
1 EDB exploit
7.8
CVSSv3
CVE-2017-1085
In FreeBSD prior to 11.2-RELEASE, an application which calls setrlimit() to increase RLIMIT_STACK may turn a read-only memory region below the stack into a read-write region. A specially crafted executable could be exploited to execute arbitrary code in the user context.
Freebsd Freebsd
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2