Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ask vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2017-1000020
SYN Flood or FIN Flood attack in ECos 1 and other versions embedded devices results in web Authentication Bypass. "eCos Embedded Web Servers used by Multiple Routers and Home devices, while sending SYN Flood or FIN Flood packets fails to validate and handle the packets and d...
Ecos Embedded Web Servers
10
CVSSv2
CVE-2007-5108
Unspecified vulnerability in IAC Search & Media ask.com toolbar has unknown impact and remote attack vectors. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable ad...
Ask.com Ask Toolbar
1 EDB exploit
10
CVSSv2
CVE-2002-0013
Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test...
Snmp Snmp
1 EDB exploit
9.3
CVSSv2
CVE-2007-5107
Stack-based buffer overflow in the AskJeevesToolBar.SettingsPlugin.1 ActiveX control in askBar.dll in IAC Search & Media ask.com Ask Toolbar 4.0.2.53 and previous versions allows remote malicious users to execute arbitrary code via a long ShortFormat property value. NOTE: som...
Ask.com Ask Toolbar
2 EDB exploits
7.8
CVSSv2
CVE-2007-2210
A certain ActiveX control in askPopStp.dll in Netsprint Ask IE Toolbar 1.1 allows remote malicious users to cause a denial of service (Internet Explorer crash) via a long AddAllowed property value, related to "improper memory handling," possibly a buffer overflow.
Netsprint Ask Ie Toolbar 1.1
1 EDB exploit
7.6
CVSSv2
CVE-2021-41066
An issue exists in Listary up to and including 6. When Listary is configured as admin, Listary will not ask for permissions again if a user tries to access files on the system from Listary itself (it will bypass UAC protection; there is no privilege validation of the current user...
Bopsoft Listary
7.6
CVSSv2
CVE-2006-2198
OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x prior to 2.0.3 allows user-assisted malicious users to conduct unauthorized activities via an OpenOffice document with a malicious BASIC macro, which is executed without prompting the user.
Openoffice Openoffice 1.1.1a
Openoffice Openoffice 1.1.1b
Openoffice Openoffice 2.0.0 Rc2
Openoffice Openoffice 2.0.0 Rc3
Openoffice Openoffice 2.0.3 Rc4
Openoffice Openoffice 2.0.3 Rc5
Openoffice Openoffice 1.1.4
Openoffice Openoffice 1.1.5
Openoffice Openoffice 2.0.2 Rc2
Openoffice Openoffice 2.0.2 Rc3
Sun Staroffice 8.0
Openoffice Openoffice 1.1.2
Openoffice Openoffice 1.1.3
Openoffice Openoffice 2.0.1
Openoffice Openoffice 2.0.2
Openoffice Openoffice 2.0.2 Rc1
Openoffice Openoffice 2.0.3 Rc6
Sun Staroffice 7.0
Openoffice Openoffice 1.1.0
Openoffice Openoffice 1.1.1
Openoffice Openoffice 2.0.0
Openoffice Openoffice 2.0.0 Rc1
7.6
CVSSv2
CVE-2006-2199
Unspecified vulnerability in Java Applets in OpenOffice.org 1.1.x (aka StarOffice) up to 1.1.5 and 2.0.x prior to 2.0.3 allows user-assisted malicious users to escape the Java sandbox and conduct unauthorized activities via certain applets in OpenOffice documents.
Openoffice Openoffice 1.1.5
Openoffice Openoffice 2.0.0
Openoffice Openoffice 1.1.0
Openoffice Openoffice 2.0.1
Openoffice Openoffice 2.0.2
Openoffice Openoffice 1.1.3
Openoffice Openoffice 1.1.4
Sun Staroffice 8.0
Openoffice Openoffice 1.1.1
Openoffice Openoffice 1.1.2
Sun Staroffice 6.0
Sun Staroffice 7.0
7.6
CVSSv2
CVE-2006-3117
Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x prior to 2.0.3 allows user-assisted malicious users to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math,...
Openoffice Openoffice 1.1.4
Openoffice Openoffice 2.0
Openoffice Openoffice 2.0.0
Openoffice Openoffice 2.0.1
Openoffice Openoffice 1.1.2
Openoffice Openoffice 1.1.3
Sun Staroffice 7.0
Sun Staroffice 8.0
Openoffice Openoffice 1.1.0
Openoffice Openoffice 1.1.1
Openoffice Openoffice 2.0.2
Sun Staroffice 6.0
7.5
CVSSv2
CVE-2008-5124
JSCAPE Secure FTP Applet 4.8.0 and previous versions does not ask the user to verify a new or mismatched SSH host key, which makes it easier for remote malicious users to perform man-in-the-middle attacks.
Jscape Secure Ftp Applet 4.6.0
Jscape Secure Ftp Applet 4.5.0
Jscape Secure Ftp Applet 3.0.2
Jscape Secure Ftp Applet 3.0.1
Jscape Secure Ftp Applet 3.0
Jscape Secure Ftp Applet 1.4
Jscape Secure Ftp Applet 1.3
Jscape Secure Ftp Applet 4.2.0
Jscape Secure Ftp Applet 4.0
Jscape Secure Ftp Applet 2.1
Jscape Secure Ftp Applet 2.0
Jscape Secure Ftp Applet 4.4.0
Jscape Secure Ftp Applet 4.3.0
Jscape Secure Ftp Applet 2.6
Jscape Secure Ftp Applet 2.5
Jscape Secure Ftp Applet 1.2
Jscape Secure Ftp Applet 1.1
Jscape Secure Ftp Applet
Jscape Secure Ftp Applet 4.7
Jscape Secure Ftp Applet 3.0.4
Jscape Secure Ftp Applet 3.0.3
Jscape Secure Ftp Applet 1.6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »