Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
andrew vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1356
Stack-based buffer overflow in the count_vcards function in LibVC 3, as used in Rolo, allows user-assisted malicious users to execute arbitrary code via a vCard file (e.g. contacts.vcf) containing a long line.
Andrew Hsu Rolo 11
Andrew Hsu Libvc 3
1 EDB exploit
NA
CVE-2014-7073
The Andrew Magdy Kamal's Network (aka com.wAndSocialREWApps) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Andrew Magdy Kamal\\'s Network Project Andrew Magdy Kamal\\'s Network 0.1
NA
CVE-2004-0426
rsync prior to 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote malicious users to write files outside of the module's path.
Andrew Tridgell Rsync
NA
CVE-2009-0829
Multiple SQL injection vulnerabilities in QuoteBook allow remote malicious users to execute arbitrary SQL commands via the (1) MyBox and (2) selectFavorites parameters to (a) quotes.php and the (3) QuoteName and (4) QuoteText parameters to (b) quotesadd.php. NOTE: the provenance ...
Andrew Freed Quotebook -
1 EDB exploit
NA
CVE-2009-0830
Cross-site scripting (XSS) vulnerability in QuoteBook allows remote malicious users to inject arbitrary web script or HTML via the (1) QuoteName and (2) QuoteText parameters to quotesadd.php. NOTE: the provenance of this information is unknown; the details are obtained solely fro...
Andrew Freed Quotebook -
NA
CVE-1999-0473
The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.
Andrew Tridgell Rsync
NA
CVE-2004-1710
page.cgi allows remote malicious users to execute arbitrary commands via shell metacharacters in the url parameter.
Andrew Kilpatrick Page Cgi
NA
CVE-2003-0388
pam_wheel in Linux-PAM 0.78, with the trust option enabled and the use_uid option disabled, allows local users to spoof log entries and gain privileges by causing getlogin() to return a spoofed user name.
Andrew Morgan Linux Pam
1 EDB exploit
NA
CVE-2009-1273
pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote malicious users to enumerate usernames.
Andrew J.korty Pam Ssh 1.92
NA
CVE-2007-0003
pam_unix.so in Linux-PAM 0.99.7.0 allows context-dependent malicious users to log into accounts whose password hash, as stored in /etc/passwd or /etc/shadow, has only two characters.
Andrew Morgan Linux Pam 0.99.7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »