Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
article system vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-0360
The Microsoft Log Sink Class ActiveX control in pkmcore.dll is marked as "safe for scripting" for Internet Explorer, which allows remote malicious users to create or append to arbitrary files.
Microsoft Log Sink Class Activex Control
6.8
CVSSv2
CVE-2006-4704
Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils.WMIObjectBroker2) ActiveX control (WmiScriptUtils.dll) in Microsoft Visual Studio 2005 allows remote malicious users to bypass Internet zone restrictions and execute arbitrary code by instantiating danger...
Microsoft Visual Studio .net 2005
1 EDB exploit
1 Article
7.6
CVSSv2
CVE-2020-1380
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who...
Microsoft Internet Explorer 11
5 Articles
5.1
CVSSv2
CVE-2006-0003
Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote malicious users to execute arbitrary code via unknown attack vectors.
Microsoft Data Access Components 2.5
Microsoft Data Access Components 2.8
Microsoft Data Access Components 2.7
3 EDB exploits
2 Articles
4
CVSSv2
CVE-2017-16854
In Open Ticket Request System (OTRS) up to and including 3.3.20, 4 up to and including 4.0.26, 5 up to and including 5.0.24, and 6 up to and including 6.0.1, an attacker who is logged in as a customer can use the ticket search form to disclose internal article information of thei...
Otrs Otrs
Debian Debian Linux 7.0
Debian Debian Linux 9.0
Debian Debian Linux 8.0
4.6
CVSSv2
CVE-2002-0034
The Microsoft CONVERT.EXE program, when used on Windows 2000 and Windows XP systems, does not apply the default NTFS permissions when converting a FAT32 file system, which could cause the conversion to produce a file system with less secure permissions than expected.
Microsoft Windows Xp
Microsoft Windows 2000
6.4
CVSSv2
CVE-2009-0209
PI Server in OSIsoft PI System prior to 3.4.380.x does not properly use encryption in the default authentication process, which allows remote malicious users to read or modify information in databases via unspecified vectors.
Osisoft Pi Server 3.4.370
Osisoft Pi Server 3.4.363.97
Osisoft Pi Server 3.4.375.99
Osisoft Pi Server 2.6
Osisoft Pi Server 2.4
Osisoft Pi Server
7.5
CVSSv2
CVE-2006-2391
Buffer overflow in EMC Retrospect Client 5.1 up to and including 7.5 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet to port 497.
Emc Retrospect Client 5.1
Emc Retrospect Client 6.5
Emc Retrospect Client 7.0
Emc Retrospect Client 7.5
9.3
CVSSv2
CVE-2020-24433
Adobe Acrobat Reader DC versions 2020.012.20048 (and previous versions), 2020.001.30005 (and previous versions) and 2017.011.30175 (and previous versions) are affected by a local privilege escalation vulnerability that could enable a user without administrator privileges to delet...
Adobe Acrobat Reader Dc
Adobe Acrobat Dc
Adobe Acrobat
Adobe Acrobat Reader
7.5
CVSSv2
CVE-2004-0206
Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows malicious users to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an...
Microsoft Windows Xp
Microsoft Windows 98
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 2003 Server R2
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »