Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
benjurry vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-1224
Caucho Technology Resin 1.2 and possibly earlier allows remote malicious users to view JSP source via an HTTP request to a .jsp file with certain characters appended to the file name, such as (1) "..", (2) "%2e..", (3) "%81", (4) "%82", and...
Caucho Technology Resin 1.1.5
Caucho Technology Resin 1.2
1 EDB exploit
7.5
CVSSv2
CVE-2001-0051
IBM DB2 Universal Database version 6.1 creates an account with a default user name and password, which allows remote malicious users to gain access to the database.
Ibm Db2 Universal Database 6.1
1 EDB exploit
2.1
CVSSv2
CVE-2001-0052
IBM DB2 Universal Database version 6.1 allows users to cause a denial of service via a malformed query.
Ibm Db2 Universal Database 6.1
Ibm Db2 Universal Database 7.1
1 EDB exploit
10
CVSSv2
CVE-2001-0499
Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and previous versions allows remote malicious users to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD.
Oracle Oracle8i
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started