Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zhodiac vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0012
Buffer overflow in w3-msql CGI program in miniSQL package allows remote malicious users to execute commands.
Hughes Msql 2.0.11
1 EDB exploit
NA
CVE-2000-1026
Multiple buffer overflows in LBNL tcpdump allow remote malicious users to execute arbitrary commands.
Lbl Tcpdump 3.4
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5 Alpha
1 EDB exploit
NA
CVE-2000-0096
Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.
Qualcomm Qpopper 3.0beta15
Qualcomm Qpopper 3.0beta16
Qualcomm Qpopper 3.0beta17
Qualcomm Qpopper 3.0beta18
Qualcomm Qpopper 3.0beta19
Qualcomm Qpopper 3.0beta4
Qualcomm Qpopper 3.0beta5
Qualcomm Qpopper 3.0beta6
Qualcomm Qpopper 3.0beta7
Qualcomm Qpopper 3.0
Qualcomm Qpopper 3.0beta1
Qualcomm Qpopper 3.0beta10
Qualcomm Qpopper 3.0beta23
Qualcomm Qpopper 3.0beta24
Qualcomm Qpopper 3.0beta25
Qualcomm Qpopper 3.0beta26
Qualcomm Qpopper 3.0beta11
Qualcomm Qpopper 3.0beta13
Qualcomm Qpopper 3.0beta2
Qualcomm Qpopper 3.0beta21
Qualcomm Qpopper 3.0beta28
Qualcomm Qpopper 3.0beta3
1 EDB exploit
NA
CVE-1999-0405
A buffer overflow in lsof allows local users to obtain root privilege.
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.8
Suse Suse Linux 6.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Suse Suse Linux 4.2
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 4.4.1
Suse Suse Linux 5.0
Debian Debian Linux 2.0
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Suse Suse Linux 5.1
Suse Suse Linux 5.3
Debian Debian Linux 2.0.5
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started