Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
superuser vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2003-0722
The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote malicious users to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.
Sun Solaris
2 EDB exploits
1000
VMScore
CVE-2003-0240
The web-based administration capability for various Axis Network Camera products allows remote malicious users to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash).
Axis 2110 Network Camera
Axis 2120 Network Camera
Axis 2100 Network Camera
Axis 250s Video Server
Axis 2130 Ptz Network Camera
Axis 2400 Video Server
Axis 2401 Video Server
Axis 2420 Network Camera
Axis 2460 Network Dvr
1 EDB exploit
1000
VMScore
CVE-2002-1361
overflow.cgi CGI script in Sun Cobalt RaQ 4 with the SHP (Security Hardening Patch) installed allows remote malicious users to execute arbitrary code via a POST request with shell metacharacters in the email parameter.
Sun Cobalt Raq 4
1 EDB exploit
1000
VMScore
CVE-2001-0779
Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote malicious users to gain root access via a long username.
Sun Sunos 5.7
Sun Sunos 5.8
Sun Solaris 7.0
Sun Solaris 2.6
Sun Solaris 8.0
Sun Sunos -
1 EDB exploit
1000
VMScore
CVE-2001-0008
Backdoor account in Interbase database server allows remote malicious users to overwrite arbitrary files using stored procedures.
Firebirdsql Firebird
Borland Software Interbase 5.0
Borland Software Interbase 6.0
Borland Software Interbase 4.0
1 EDB exploit
908
VMScore
CVE-2019-9193
In PostgreSQL 9.3 up to and including 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is en...
Postgresql Postgresql
1 EDB exploit
10 Github repositories
905
VMScore
CVE-2007-0528
The admin web console implemented by the Centrality Communications (aka Aredfox) PA168 chipset and firmware 1.54 and previous versions, as provided by various IP phones, does not require passwords or authentication tokens when using HTTP, which allows remote malicious users to co...
Centrality Communications Pa168 Chipset
1 EDB exploit
892
VMScore
CVE-2013-1903
PostgreSQL, possibly 9.2.x prior to 9.2.4, 9.1.x prior to 9.1.9, 9.0.x prior to 9.0.13, 8.4.x prior to 8.4.17, and 8.3.x prior to 8.3.23 incorrectly provides the superuser password to scripts related to "graphical installers for Linux and Mac OS X," which has unspecifie...
Postgresql Postgresql 9.2.3
Postgresql Postgresql 9.2.2
Postgresql Postgresql 9.2.1
Postgresql Postgresql 9.2
Postgresql Postgresql 9.1.3
Postgresql Postgresql 9.1.6
Postgresql Postgresql 9.1.7
Postgresql Postgresql 9.1.4
Postgresql Postgresql 9.1.1
Postgresql Postgresql 9.1.5
Postgresql Postgresql 9.1
Postgresql Postgresql 9.1.8
Postgresql Postgresql 9.1.2
Postgresql Postgresql 9.0.12
Postgresql Postgresql 9.0
Postgresql Postgresql 9.0.5
Postgresql Postgresql 9.0.3
Postgresql Postgresql 9.0.6
Postgresql Postgresql 9.0.4
Postgresql Postgresql 9.0.1
Postgresql Postgresql 9.0.2
Postgresql Postgresql 9.0.10
890
VMScore
CVE-2022-1668
Weak default root user credentials allow remote malicious users to easily obtain OS superuser privileges over the open TCP port for SSH.
Secheron Sepcos Control And Protection Relay Firmware
890
VMScore
CVE-2021-37555
TX9 Automatic Food Dispenser v3.2.57 devices allow access to a shell as root/superuser, a related issue to CVE-2019-16734. To connect, the telnet service is used on port 23 with the default password of 059AnkJ for the root account. The user can then download the filesystem throug...
Trixie Tx9 Automatic Food Dispenser Firmware 3.2.57
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »