Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cmn vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2004-0353
Multiple buffer overflows in auth_ident() function in auth.c for GNU Anubis 3.6.0 up to and including 3.6.2, 3.9.92 and 3.9.93 allow remote malicious users to gain privileges via a long string.
Gnu Anubis 3.6.0
Gnu Anubis 3.6.1
Gnu Anubis 3.6.2
Gnu Anubis 3.9.92
Gnu Anubis 3.9.93
1 EDB exploit
730
VMScore
CVE-2003-0289
Format string vulnerability in scsiopen.c of the cdrecord program in cdrtools 2.0 allows local users to gain privileges via format string specifiers in the dev parameter.
Cdrtools Cdrecord 2.0
Cdrtools Cdrecord 1.11
2 EDB exploits
1 Github repository
730
VMScore
CVE-2003-0144
Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 up to and including 7.3, OpenBSD 3.2 and previous versions, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) use...
Lprold Lprold 3.0.48
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.2
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Bsd Lpr 0.48
Bsd Lpr 2000-05-07
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
2 EDB exploits
475
VMScore
CVE-2003-0325
Buffer overflow in Maelstrom 3.0.6, 3.0.5, and previous versions allows local users to execute arbitrary code via a long -server command line argument.
Ambrosia Software Maelstrom 3.0.6
Ambrosia Software Maelstrom
3 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started