Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
david litchfield vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2002-0721
Microsoft SQL Server 7.0 and 2000 installs with weak permissions for extended stored procedures that are associated with helper functions, which could allow unprivileged users, and possibly remote attackers, to run stored procedures with administrator privileges via (1) xp_execre...
Microsoft Sql Server 2000
Microsoft Data Engine 1.0
Microsoft Data Engine 2000
Microsoft Sql Server 7.0
1 EDB exploit
445
VMScore
CVE-2002-0560
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote malicious users to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns.
Oracle Application Server Web Cache 2.0.0.0
Oracle Application Server Web Cache 2.0.0.1
Oracle Application Server Web Cache 2.0.0.2
Oracle Application Server Web Cache 2.0.0.3
Oracle Oracle8i 8.1.7
Oracle Application Server 1.0.2
Oracle Oracle9i 9.0.1
Oracle Oracle8i 8.1.7.1
Oracle Oracle9i 9.0
1000
VMScore
CVE-2000-0425
Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote malicious users to execute arbitrary commands.
Lsoft Listserv 1.8
1 EDB exploit
505
VMScore
CVE-1999-1030
counter.exe 2.70 allows a remote malicious user to cause a denial of service (hang) via an HTTP request that ends in %0A (newline), which causes a malformed entry in the counter log that produces an access violation.
Behold Software Web Page Counter 2.7
1 EDB exploit
505
VMScore
CVE-1999-1130
Default configuration of the search engine in Netscape Enterprise Server 3.5.1, and possibly other versions, allows remote malicious users to read the source of JHTML files by specifying a search command using the HTML-tocrec-demo1.pat pattern file.
Netscape Enterprise Server
1 EDB exploit
505
VMScore
CVE-2002-0419
Information leaks in IIS 4 up to and including 5.1 allow remote malicious users to obtain potentially sensitive information or more easily conduct brute force attacks via responses from the server in which (2) in certain configurations, the server IP address is provided as the re...
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
1 EDB exploit
505
VMScore
CVE-2000-0302
Microsoft Index Server allows remote malicious users to view the source code of ASP files by appending a %20 to the filename in the CiWebHitsFile argument to the null.htw URL.
Microsoft Index Server 2.0
1 EDB exploit
505
VMScore
CVE-2000-0951
A misconfiguration in IIS 5.0 with Index Server enabled and the Index property set allows remote malicious users to list directories in the web root via a Web Distributed Authoring and Versioning (WebDAV) search.
Microsoft Internet Information Services 5.0
1 EDB exploit
465
VMScore
CVE-2000-1081
The xp_displayparamstmt function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an malicious user to c...
Microsoft Sql Server 7.0
Microsoft Data Engine 1.0
Microsoft Data Engine 2000
Microsoft Sql Server 2000
1 EDB exploit
215
VMScore
CVE-2000-1083
The xp_showcolv function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an malicious user to cause a d...
Microsoft Data Engine 2000
Microsoft Sql Server 2000
Microsoft Sql Server 7.0
Microsoft Data Engine 1.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »