Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adik vulnerabilities and exploits
(subscribe to this query)
760
VMScore
CVE-2003-0822
Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote malicious users to execute arbitrary code via a crafted chunked encoded request.
Microsoft Frontpage Server Extensions 2000
Microsoft Frontpage Server Extensions 2002
Microsoft Sharepoint Team Services 2002
Microsoft Windows 2000
Microsoft Windows Xp
2 EDB exploits
730
VMScore
CVE-1999-1497
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local malicious users to read passwords for e-mail accounts.
Ipswitch Imail 5.0.8
Ipswitch Imail 6.0
Ipswitch Imail 5.0
Ipswitch Imail 5.0.6
Ipswitch Imail 5.0.5
Ipswitch Imail 5.0.7
2 EDB exploits
770
VMScore
CVE-2003-1030
Buffer overflow in DameWare Mini Remote Control prior to 3.73 allows remote malicious users to execute arbitrary code via a long pre-authentication request to TCP port 6129.
Dameware Development Mini Remote Control Server 3.70 .0.0
Dameware Development Mini Remote Control Server 3.71 .0.0
Dameware Development Mini Remote Control Server 3.72 .0.0
4 EDB exploits
770
VMScore
CVE-2003-0717
The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote malicious users to execute arbitrary code via a buffer overflow attack.
Microsoft Windows 2000
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows Me
Microsoft Windows 2003 Server Enterprise
4 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started