Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
buffer overflow vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-4322
Stack-based buffer overflow in RealFlex Technologies Ltd. RealWin Server 2.0, as distributed by DATAC, allows remote malicious users to execute arbitrary code via a crafted FC_INFOTAG/SET_CONTROL packet.
Realflex Technologies Ltd Realwin Server 2.0
1 EDB exploit
5.1
CVSSv2
CVE-2006-3814
Buffer overflow in the Loader_XM::load_instrument_internal function in loader_xm.cpp for Cheese Tracker 0.9.9 and previous versions allows user-assisted malicious users to execute arbitrary code via a crafted file with a large amount of extra data.
Cheese Tracker Cheese Tracker
1 EDB exploit
9.3
CVSSv2
CVE-2008-0610
Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 prior to 01252008, when in LISTENING mode or when using the DSM plugin, allows remote malicious users to execute arbi...
Ultravnc Ultravnc 1.0.4 Rc7
Ultravnc Ultravnc 1.0.4 Rc8
Ultravnc Ultravnc 1.0.4
Ultravnc Ultravnc 1.0.4 Rc6
Ultravnc Ultravnc 1.0.2
1 EDB exploit
6.8
CVSSv2
CVE-2010-1458
Stack-based buffer overflow in Create and Extract Zips TweakFS Zip Utility 1.0 for Flight Simulator X (FSX) allows remote malicious users to execute arbitrary code via a long filename in a ZIP archive.
Tweakfs Tweakfs Zip Utility 1.0
1 EDB exploit
5
CVSSv2
CVE-2006-1101
The (1) sgetstr and (2) getint functions in Sauerbraten 2006_02_28, as derived from the Cube engine, allow remote malicious users to cause a denial of service (segmentation fault) via long streams of input data that trigger an out-of-bounds read, as demonstrated using SV_EXT tag ...
Sauerbraten Cube 2005-08-09
Sauerbraten Sauerbraten 2006-02-28
2 EDB exploits
7.5
CVSSv2
CVE-2005-3863
Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and previous versions, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote malicious users to execute arbitrary code via a long parameter to the VGETSTRING ...
Ktools Ktools
10
CVSSv2
CVE-2001-0233
Buffer overflow in micq client 0.4.6 and previous versions allows remote malicious users to cause a denial of service, and possibly execute arbitrary commands, via a long Description field.
Matthew Smith Micq
Debian Debian Linux 2.2
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
1 EDB exploit
10
CVSSv2
CVE-2004-1286
Buffer overflow in the auto_filter_extern function in auto.c for NapShare 1.2, with the extern filter enabled, allows remote malicious users to execute arbitrary code via a crafted gnutella response.
Napshare Napshare 1.2
2 EDB exploits
7.5
CVSSv2
CVE-2006-3251
Heap-based buffer overflow in the array_push function in hashcash.c for Hashcash prior to 1.21 might allow malicious users to execute arbitrary code via crafted entries.
Hashcash Hashcash 1.04
Hashcash Hashcash 1.05
Hashcash Hashcash 1.13
Hashcash Hashcash 1.14
Hashcash Hashcash 1.02
Hashcash Hashcash 1.03
Hashcash Hashcash 1.11
Hashcash Hashcash 1.12
Hashcash Hashcash 1.19
Hashcash Hashcash
Hashcash Hashcash 1.06
Hashcash Hashcash 1.07
Hashcash Hashcash 1.08
Hashcash Hashcash 1.15
Hashcash Hashcash 1.16
Hashcash Hashcash 1.00
Hashcash Hashcash 1.01
Hashcash Hashcash 1.09
Hashcash Hashcash 1.10
Hashcash Hashcash 1.17
Hashcash Hashcash 1.18
7.5
CVSSv2
CVE-2017-7938
Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution o...
Mor-pah.net Dmitry Deepmagic Information Gathering Tool 1.3a
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
administrator privileges
CVE-2024-1579
hardcoded
CVE-2023-20198
CVE-2024-33587
CVE-2024-33449
CVE-2024-4308
HTML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »