Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
traffic server vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2013-5509
The SSL implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0 prior to 9.0(2.6) and 9.1 prior to 9.1(2) allows remote malicious users to bypass authentication, and obtain VPN access or administrative access, via a crafted X.509 client certificate, aka Bug ID CSCu...
Cisco Adaptive Security Appliance Software 9.0
Cisco Adaptive Security Appliance Software 9.1
890
VMScore
CVE-2013-5511
The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x prior to 8.2(5.46), 8.3.x prior to 8.3(2.39), 8.4.x prior to 8.4(6), 8.5.x prior to 8.5(1.18), 8.6.x prior to 8.6(1.12), 8.7.x prior to 8.7(1.7), 9.0...
Cisco Adaptive Security Appliance Software 8.3.1
Cisco Adaptive Security Appliance Software 8.2.2
Cisco Adaptive Security Appliance Software 8.2.1
Cisco Adaptive Security Appliance Software 8.3.2
Cisco Adaptive Security Appliance Software 8.3\\(2.34\\)
Cisco Adaptive Security Appliance Software 8.2.3
Cisco Adaptive Security Appliance Software 8.2\\(5.38\\)
Cisco Adaptive Security Appliance Software 8.2\\(3\\)
Cisco Adaptive Security Appliance Software 8.2\\(4\\)
Cisco Adaptive Security Appliance Software 8.2\\(3.9\\)
Cisco Adaptive Security Appliance Software 8.2\\(5\\)
Cisco Adaptive Security Appliance Software 8.2\\(2\\)
Cisco Adaptive Security Appliance Software 8.3\\(2\\)
Cisco Adaptive Security Appliance Software 8.2\\(4.4\\)
Cisco Adaptive Security Appliance Software 8.2\\(5.35\\)
Cisco Adaptive Security Appliance Software 8.2
Cisco Adaptive Security Appliance Software 8.2\\(1\\)
Cisco Adaptive Security Appliance Software 8.3\\(1\\)
Cisco Adaptive Security Appliance Software 8.3\\(2.37\\)
Cisco Adaptive Security Appliance Software 8.2\\(4.1\\)
Cisco Adaptive Security Appliance Software 8.4\\(1.11\\)
Cisco Adaptive Security Appliance Software 8.4\\(2\\)
890
VMScore
CVE-2012-4505
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012...
Libproxy Project Libproxy 0.2.3
Libproxy Project Libproxy 0.3.1
Libproxy Project Libproxy 0.3.0
890
VMScore
CVE-2011-1919
Multiple stack-based buffer overflows in GE Intelligent Platforms Proficy Applications prior to 4.4.1 SIM 101 and 5.x prior to 5.0 SIM 43 allow remote malicious users to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted TCP message traffic to...
Ge Intelligent Platforms Proficy Historian 4.0
Ge Intelligent Platforms Proficy Historian 5.0
Ge Intelligent Platforms Proficy Historian
890
VMScore
CVE-2009-0846
The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) prior to 1.6.4 allows remote malicious users to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving...
Mit Kerberos 5
Fedoraproject Fedora 10
Fedoraproject Fedora 9
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Apple Mac Os X
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Eus 4.7
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
Redhat Enterprise Linux Server 2.0
Redhat Enterprise Linux Workstation 2.0
890
VMScore
CVE-2009-0216
GE Fanuc iFIX 5.0 and previous versions relies on client-side authentication involving a weakly encrypted local password file, which allows remote malicious users to bypass intended access restrictions and start privileged server login sessions by recovering a password or by usin...
Ge Fanuc Ifix
Ge Fanuc Ifix 2.21
Ge Fanuc Ifix 2.2
Ge Fanuc Ifix 3.5
Ge Fanuc Ifix 3.0
Ge Fanuc Ifix 2.6
Ge Fanuc Ifix 2.5
Ge Fanuc Ifix 4.5
Ge Fanuc Ifix 4.0
Ge Fanuc Ifix 2.0
1 Github repository
890
VMScore
CVE-2008-0947
Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 up to and including 1.6.3 allows remote malicious users to execute arbitrary code by triggering a large number of open file descriptors.
Mit Kerberos 5 1.5
Mit Kerberos 5 1.5.1
Mit Kerberos 5 1.4
Mit Kerberos 5 1.5.2
Mit Kerberos 5 1.5.3
Mit Kerberos 5 1.4.3
Mit Kerberos 5 1.4.4
Mit Kerberos 5 1.6.2
Mit Kerberos 5 1.6.3
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.4.2
Mit Kerberos 5 1.6
Mit Kerberos 5 1.6.1
890
VMScore
CVE-2007-4473
Gesytec Easylon OPC Server prior to 2.3.44 does not properly validate server handles, which allows remote malicious users to execute arbitrary code or cause a denial of service via unspecified network traffic to the OLE for Process Control (OPC) interface, probably related to fre...
Gesytec Easylon Opc Server 2.30.32
890
VMScore
CVE-2007-6330
Meridian Prolog Manager 2007, and 7.5 and previous versions, sends all usernames and passwords to the client in a (1) cleartext or (2) weakly encrypted format to support client-side login authentication, which makes it easier for remote malicious users to obtain database access b...
Meridian Software Prolog Manager 7.0
Meridian Software Prolog Manager 7.5
Meridian Software Prolog Manager 2007
890
VMScore
CVE-2007-5419
The 3Com 3CRWER100-75 router with 1.2.10ww software, when enabling an optional virtual server, configures this server to accept all source IP addresses on the external (Internet) interface unless the user selects other options, which might expose the router to unintended incoming...
3com 3crwe554g72t 3crwer100-75
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »