Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
chris anley vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2001-0265
ASCII Armor parser in Windows PGP 7.0.3 and previous versions allows malicious users to create files in arbitrary locations via a malformed ASCII armored file.
Pgp Pgp
Pgp Pgp 5
1 EDB exploit
2.1
CVSSv2
CVE-2005-4868
Shared memory sections and events in IBM DB2 8.1 have default permissions of read and write for the Everyone group, which allows local users to gain unauthorized access, gain sensitive information, such as cleartext passwords, and cause a denial of service.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1
1 EDB exploit
2.1
CVSSv2
CVE-2005-4869
The (1) to_char and (2) to_date function in IBM DB2 8.1 allows local users to cause a denial of service (application crash) via an empty string in the second parameter, which causes a null pointer dereference.
Ibm Db2 8.1
1 EDB exploit
7.2
CVSSv2
CVE-2007-0753
Format string vulnerability in the VPN daemon (vpnd) in Apple Mac OS X 10.3.9 and 10.4.9 allows local users to execute arbitrary code via the -i parameter.
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X 10.4.1
Apple Mac Os X 10.4.2
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.4.6
Apple Mac Os X Server 10.4.7
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X 10.3.9
Apple Mac Os X 10.4
Apple Mac Os X 10.4.8
Apple Mac Os X 10.4.9
Apple Mac Os X Server 10.3.6
Apple Mac Os X Server 10.3.7
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.4.5
Apple Mac Os X 10.3
Apple Mac Os X 10.3.7
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started