Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wojciech purczynski vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
NA
CVE-2003-0244
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote malicious users to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
Linux Linux Kernel 2.4.0
NA
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.11
4 EDB exploits
NA
CVE-2003-0001
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote malicious users to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
Linux Linux Kernel 2.4.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Netbsd Netbsd 1.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.9
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
3 EDB exploits
2 Github repositories
NA
CVE-2002-1783
CRLF injection vulnerability in PHP 4.2.1 up to and including 4.2.3, when allow_url_fopen is enabled, allows remote malicious users to modify HTTP headers for outgoing requests by causing CRLF sequences to be injected into arguments that are passed to the (1) fopen or (2) file fu...
Php Php 3.0.14
Php Php 3.0.15
Php Php 4.0.6
Php Php 4.0.7
Php Php 4.2.3
Php Php 3.0.18
Php Php 4.0.3
Php Php 4.1.2
Php Php 4.2.0
Php Php 4.0.4
Php Php 4.0.5
Php Php 4.2.1
Php Php 4.2.2
Php Php 3.0.16
Php Php 3.0.17
Php Php 4.1.0
Php Php 4.1.1
NA
CVE-2002-0985
Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow malicious users to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands.
Php Php
Openpkg Openpkg 1.1
Openpkg Openpkg 1.2
NA
CVE-2002-0986
The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote malicious users to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy."
Php Php 4.0.3
Php Php 4.2.0
Php Php 4.2.1
Php Php 4.0.1
Php Php 4.0.2
Php Php 4.1.1
Php Php 4.1.2
Php Php 3.0.18
Php Php 4.0
Php Php 4.0.4
Php Php 4.0.5
Php Php 4.0.6
Php Php 4.2.2
Php Php 4.0.7
Php Php 4.1.0
NA
CVE-2002-0429
The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and previous versions on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall).
Linux Linux Kernel 2.4.18
NA
CVE-2001-1246
PHP 4.0.5 up to and including 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote malicious users to execute arbitrary commands via shell metacharacters.
Php Php
1 EDB exploit
NA
CVE-2001-0318
Format string vulnerability in ProFTPD 1.2.0rc2 may allow malicious users to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd).
Proftpd Project Proftpd 1.2.0 Rc2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »