Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
client vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2002-1792
Buffer overflow in Fake Identd 0.9 up to and including 1.4 allows remote malicious users to execute arbitrary code as root via a long request that is split into multiple packets.
Fake Identd Fake Identd 0.9
Fake Identd Fake Identd 0.9b
Fake Identd Fake Identd 1.1
Fake Identd Fake Identd 1.2
Fake Identd Fake Identd 1.3
Fake Identd Fake Identd 1.4
1 EDB exploit
1000
VMScore
CVE-2002-1318
Buffer overflow in samba 2.2.2 up to and including 2.2.6 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-end...
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.18
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Samba Samba 2.2.4
Samba Samba 2.2.5
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Samba Samba 2.2.6
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Samba Samba 2.2.2
Samba Samba 2.2.3
Sgi Irix 6.5.11
Sgi Irix 6.5.12
1000
VMScore
CVE-2002-0702
Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response.
Isc Dhcpd 3.0.1
Isc Dhcpd 3.0
1 EDB exploit
1000
VMScore
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
1000
VMScore
CVE-2002-0048
Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote malicious users to cause a denial of service and execute arbitrary code in the rsync client or server.
Andrew Tridgell Rsync 2.3.1
Andrew Tridgell Rsync 2.3.2 1.2
Andrew Tridgell Rsync 2.4.1
Andrew Tridgell Rsync 2.3.2
Andrew Tridgell Rsync 2.4.3
Andrew Tridgell Rsync 2.4.4
Andrew Tridgell Rsync 2.4.6
Andrew Tridgell Rsync 2.5.0 1
Andrew Tridgell Rsync 2.5.1
3 EDB exploits
1000
VMScore
CVE-2002-0005
Buffer overflow in AOL Instant Messenger (AIM) 4.7.2480, 4.8.2616, and other versions allows remote malicious users to execute arbitrary code via a long argument in a game request (AddGame).
Aol Instant Messenger 4.5
Aol Instant Messenger 4.6
Aol Instant Messenger 4.3.2229
Aol Instant Messenger 4.4
Aol Instant Messenger 4.7
Aol Instant Messenger 4.7.2480
Aol Instant Messenger 4.3
Aol Instant Messenger 4.8.2616
1 EDB exploit
1000
VMScore
CVE-2001-0803
Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote malicious users to execute arbitrary commands.
Open Group Cde Common Desktop Environment 1.0.1
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 1.1
2 EDB exploits
1000
VMScore
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
1000
VMScore
CVE-2001-0233
Buffer overflow in micq client 0.4.6 and previous versions allows remote malicious users to cause a denial of service, and possibly execute arbitrary commands, via a long Description field.
Matthew Smith Micq
Debian Debian Linux 2.2
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
1 EDB exploit
1000
VMScore
CVE-2001-0187
Format string vulnerability in wu-ftp 2.6.1 and previous versions, when running with debug mode enabled, allows remote malicious users to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.
Washington University Wu-ftpd 2.4.2 Beta18 Vr12
Washington University Wu-ftpd 2.4.2 Beta18 Vr13
Washington University Wu-ftpd 2.4.2 Beta18 Vr8
Washington University Wu-ftpd 2.4.2 Beta18 Vr9
Washington University Wu-ftpd 2.4.1
Washington University Wu-ftpd 2.4.2 Beta18
Washington University Wu-ftpd 2.4.2 Beta18 Vr4
Washington University Wu-ftpd 2.4.2 Beta18 Vr5
Washington University Wu-ftpd 2.4.2 Vr17
Washington University Wu-ftpd 2.5
Washington University Wu-ftpd 2.4.2 Beta18 Vr10
Washington University Wu-ftpd 2.4.2 Beta18 Vr11
Washington University Wu-ftpd 2.4.2 Beta18 Vr6
Washington University Wu-ftpd 2.4.2 Beta18 Vr7
Washington University Wu-ftpd 2.6
Washington University Wu-ftpd 2.4.2 Beta18 Vr14
Washington University Wu-ftpd 2.4.2 Beta18 Vr15
Washington University Wu-ftpd 2.4.2 Beta9
Washington University Wu-ftpd 2.4.2 Vr16
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »