Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
muts vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-0637
Buffer overflow in cram.dll in QUALCOMM Eudora WorldMail 3.0 allows remote malicious users to execute arbitrary code via an IMAP APPEND command with a long message literal argument, as demonstrated by Worldmail.pl. NOTE: this is a different vector and a different manipulation tha...
Qualcomm Eudora Worldmail 3.0
1 EDB exploit
NA
CVE-2005-4456
Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible t...
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.71
1 EDB exploit
NA
CVE-2008-1855
FrameworkService.exe in McAfee Common Management Agent (CMA) 3.6.0.574 Patch 3 and previous versions, as used by ePolicy Orchestrator (ePO) and ProtectionPilot (PrP), allows remote malicious users to corrupt memory and cause a denial of service (CMA Framework service crash) via a...
Mcafee Cma
1 EDB exploit
NA
CVE-2012-4344
Cross-site scripting (XSS) vulnerability in Ipswitch WhatsUp Gold 15.02 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors involving the SNMP system name of the attacking host.
Ipswitch Whatsup Gold 15.02
1 EDB exploit
NA
CVE-2005-4402
Buffer overflow in MailEnable Professional 1.71 and previous versions, and Enterprise 1.1 and previous versions, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command.
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional
1 EDB exploit
NA
CVE-2007-1910
Buffer overflow in wwlib.dll in Microsoft Word 2007 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted document, as demonstrated by file789-1.doc.
Microsoft Word 2007
1 EDB exploit
NA
CVE-2007-1911
Multiple unspecified vulnerabilities in Microsoft Word 2007 allow remote malicious users to cause a denial of service (CPU consumption) via crafted documents, as demonstrated by (1) file798-1.doc and (2) file613-1.doc, possibly related to a buffer overflow.
Microsoft Word 2007
1 EDB exploit
NA
CVE-2007-1912
Heap-based buffer overflow in Microsoft Windows allows user-assisted remote malicious users to have an unknown impact via a crafted .HLP file.
Microsoft Windows 2000
Microsoft Windows 2003 Server
Microsoft Windows Nt
Microsoft Windows Xp
1 EDB exploit
NA
CVE-2012-2589
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4344. Reason: This candidate is a duplicate of CVE-2012-4344. Notes: All CVE users should reference CVE-2012-4344 instead of this candidate. All references and descriptions in this candidate have been removed...
1 EDB exploit
NA
CVE-2012-2955
Multiple cross-site scripting (XSS) vulnerabilities in the administrative user interface in IBM Lotus Protector for Mail Security 2.1, 2.5, 2.5.1, and 2.8 and IBM ISS Proventia Network Mail Security System allow remote malicious users to inject arbitrary web script or HTML via th...
Ibm Proventia Network Mail Security System Firmware 2.5
Ibm Proventia Network Mail Security System Firmware 2.5.1
Ibm Proventia Network Mail Security System Firmware 2.6
Ibm Proventia Network Mail Security System Firmware 2.5.0.2
Ibm Proventia Network Mail Security System Firmware 2.8
Ibm Proventia Network Mail Security System Ms3004
Ibm Proventia Network Mail Security System
Ibm Lotus Protector For Mail Security 2.1
Ibm Lotus Protector For Mail Security 2.5
Ibm Lotus Protector For Mail Security 2.5.1
Ibm Lotus Protector For Mail Security 2.8
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »