Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
andrew vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2006-1356
Stack-based buffer overflow in the count_vcards function in LibVC 3, as used in Rolo, allows user-assisted malicious users to execute arbitrary code via a vCard file (e.g. contacts.vcf) containing a long line.
Andrew Hsu Rolo 11
Andrew Hsu Libvc 3
1 EDB exploit
5.4
CVSSv2
CVE-2014-7073
The Andrew Magdy Kamal's Network (aka com.wAndSocialREWApps) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Andrew Magdy Kamal\\'s Network Project Andrew Magdy Kamal\\'s Network 0.1
7.5
CVSSv2
CVE-2009-0829
Multiple SQL injection vulnerabilities in QuoteBook allow remote malicious users to execute arbitrary SQL commands via the (1) MyBox and (2) selectFavorites parameters to (a) quotes.php and the (3) QuoteName and (4) QuoteText parameters to (b) quotesadd.php. NOTE: the provenance ...
Andrew Freed Quotebook -
1 EDB exploit
4.3
CVSSv2
CVE-2009-0830
Cross-site scripting (XSS) vulnerability in QuoteBook allows remote malicious users to inject arbitrary web script or HTML via the (1) QuoteName and (2) QuoteText parameters to quotesadd.php. NOTE: the provenance of this information is unknown; the details are obtained solely fro...
Andrew Freed Quotebook -
2.1
CVSSv2
CVE-1999-0473
The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.
Andrew Tridgell Rsync
5
CVSSv2
CVE-2004-0426
rsync prior to 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote malicious users to write files outside of the module's path.
Andrew Tridgell Rsync
4.6
CVSSv2
CVE-2003-0388
pam_wheel in Linux-PAM 0.78, with the trust option enabled and the use_uid option disabled, allows local users to spoof log entries and gain privileges by causing getlogin() to return a spoofed user name.
Andrew Morgan Linux Pam
1 EDB exploit
7.5
CVSSv2
CVE-2004-1710
page.cgi allows remote malicious users to execute arbitrary commands via shell metacharacters in the url parameter.
Andrew Kilpatrick Page Cgi
7.2
CVSSv2
CVE-2007-0003
pam_unix.so in Linux-PAM 0.99.7.0 allows context-dependent malicious users to log into accounts whose password hash, as stored in /etc/passwd or /etc/shadow, has only two characters.
Andrew Morgan Linux Pam 0.99.7.0
5
CVSSv2
CVE-2009-1273
pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote malicious users to enumerate usernames.
Andrew J.korty Pam Ssh 1.92
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »