Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
various vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0150
Buffer overflow in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote malicious users to spoof the safety check for HTTP headers and cause a denial of service or execute arbitrary code via HTTP header field values.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
7.5
CVSSv2
CVE-2002-0364
Buffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows malicious users to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise."
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
7
CVSSv3
CVE-2019-13226
deepin-clone prior to 1.1.3 uses a predictable path /tmp/.deepin-clone/mount/<block-dev-basename> in the Helper::temporaryMountDevice() function to temporarily mount a file system as root. An unprivileged user can prepare a symlink at this location to have the file system m...
Deepin Deepin-clone
Fedoraproject Fedora 30
5.5
CVSSv3
CVE-2019-13229
deepin-clone prior to 1.1.3 uses a fixed path /tmp/partclone.log in the Helper::getPartitionSizeInfo() function to write a log file as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system l...
Deepin Deepin Clone
6.8
CVSSv2
CVE-2006-7227
Integer overflow in Perl-Compatible Regular Expression (PCRE) library prior to 6.7 allows context-dependent malicious users to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), whi...
Pcre Pcre
6.8
CVSSv2
CVE-2006-7228
Integer overflow in Perl-Compatible Regular Expression (PCRE) library prior to 6.7 might allow context-dependent malicious users to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calcula...
Pcre Pcre
4.3
CVSSv2
CVE-2006-7230
Perl-Compatible Regular Expression (PCRE) library prior to 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent malicious users to ca...
Pcre Pcre
5.5
CVSSv3
CVE-2019-13227
In GUI mode, deepin-clone prior to 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not at...
Deepin Deepin-clone
4.7
CVSSv3
CVE-2019-13228
deepin-clone prior to 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content ...
Deepin Deepin-clone
5
CVSSv2
CVE-2008-0983
lighttpd 1.4.18, and possibly other versions prior to 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote malicious users to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access.
Lighttpd Lighttpd 1.4.7
Lighttpd Lighttpd 1.4.8
Lighttpd Lighttpd 1.4.9
Lighttpd Lighttpd 1.4.10
Lighttpd Lighttpd 1.4.11
Lighttpd Lighttpd 1.4.12
Lighttpd Lighttpd 1.4.13
Lighttpd Lighttpd 1.4.14
Lighttpd Lighttpd 1.4.15
Lighttpd Lighttpd 1.4.16
Lighttpd Lighttpd 1.4.17
Lighttpd Lighttpd 1.4.18
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
springboot-admin
CVE-2025-3989
lecms
CVE-2025-3906
code injection
CVE-2025-32432
CVE-2025-2105
CVE-2025-3984
wireless
opplus
type confusion
CVE-2025-29306
n150rt
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »