Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
alvaro vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2010-0744
aMSN (aka Alvaro's Messenger) 0.98.3 and previous versions, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-mid...
Alvaro Alvaros Messenger 0.83
Alvaro Alvaros Messenger 0.97
Alvaro Alvaros Messenger 0.93
Alvaro Alvaros Messenger 0.95
Alvaro Alvaros Messenger 0.91
Alvaro Alvaros Messenger 0.94
Alvaro Alvaros Messenger 0.96
Alvaro Alvaros Messenger
Alvaro Alvaros Messenger 0.92
Alvaro Alvaros Messenger 0.90
6
CVSSv2
CVE-2010-3781
The PL/php add-on 1.4 and previous versions for PostgreSQL does not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, a rel...
Alvaro Herrera Pl/php
Alvaro Herrera Pl/php 1.0
Alvaro Herrera Pl/php 1.1
Alvaro Herrera Pl/php 1.2
Alvaro Herrera Pl/php 1.3.1
Alvaro Herrera Pl/php 1.3.2
Alvaro Herrera Pl/php 1.3.3
Alvaro Herrera Pl/php 1.3.5
5
CVSSv2
CVE-2007-2195
aMSN (aka Alvaro's Messenger) 0.96 and previous versions allows remote malicious users to cause a denial of service (application crash) by sending invalid data to TCP port 31337.
Alvaro Alvaros Messenger
1 EDB exploit
5
CVSSv2
CVE-2004-0558
The Internet Printing Protocol (IPP) implementation in CUPS prior to 1.1.21 allows remote malicious users to cause a denial of service (service hang) via a certain UDP packet to the IPP port.
Easy Software Products Cups
1 EDB exploit
1 Github repository
7.5
CVSSv2
CVE-2016-4000
Jython prior to 2.7.1rc1 allows malicious users to execute arbitrary code via a crafted serialized PyFunction object.
Jython Project Jython 2.7.0
Debian Debian Linux 8.0
1 Article
4.3
CVSSv2
CVE-2020-9496
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
Apache Ofbiz 17.12.03
11 Github repositories
4.6
CVSSv2
CVE-1999-0125
Buffer overflow in SGI IRIX mailx program.
Sgi Irix 5.3
Sgi Irix 5.2
Sgi Irix 6.3
Sun Solaris 2.4
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.5
Sun Sunos 5.5.1
Redhat Linux 4.2
Sun Solaris 2.6
Sun Sunos -
2 EDB exploits
9
CVSSv2
CVE-2020-10199
Sonatype Nexus Repository prior to 3.21.2 allows JavaEL Injection (issue 1 of 2).
Sonatype Nexus
13 Github repositories
NA
CVE-2022-42889
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringL...
Apache Commons Text
Netapp Bluexp -
Juniper Security Threat Response Manager
Juniper Security Threat Response Manager 7.5.0
65 Github repositories
7.5
CVSSv2
CVE-2020-17530
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
Apache Struts
Oracle Business Intelligence 12.2.1.3.0
Oracle Business Intelligence 12.2.1.4.0
Oracle Communications Policy Management 12.5.0
Oracle Financial Services Data Integration Hub 8.0.6
Oracle Financial Services Data Integration Hub 8.0.3
Oracle Hospitality Opera 5 5.6
Oracle Communications Pricing Design Center 12.0.0.3.0
Oracle Mysql Enterprise Monitor 8.0.23
Oracle Communications Diameter Intelligence Hub 8.2.3
Oracle Communications Diameter Intelligence Hub 8.0.0
Oracle Communications Diameter Intelligence Hub 8.2.0
Oracle Communications Diameter Intelligence Hub 8.1.0
18 Github repositories
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »