Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
venomous vulnerabilities and exploits
(subscribe to this query)
935
VMScore
CVE-2004-2692
The exec_dir PHP patch (php-exec-dir) 4.3.2 up to and including 4.3.7 with safe mode disabled allows remote malicious users to bypass restrictions and execute arbitrary commands via a backtick operator, which is not handled using the php_escape_shell_cmd function.
Kyberdigi Labs Php-exec-dir 4.3.2
Kyberdigi Labs Php-exec-dir 4.3.3
Kyberdigi Labs Php-exec-dir 4.3.4
Kyberdigi Labs Php-exec-dir 4.3.7
Kyberdigi Labs Php-exec-dir 4.3.5
Kyberdigi Labs Php-exec-dir 4.3.6
1 EDB exploit
1000
VMScore
CVE-2001-0609
Format string vulnerability in Infodrom cfingerd 1.4.3 and previous versions allows a remote malicious user to gain additional privileges via a malformed ident reply that is passed to the syslog function.
Infodrom Cfingerd
2 EDB exploits
1000
VMScore
CVE-2000-0917
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote malicious users to execute arbitrary commands.
Caldera Openlinux Ebuilder 3.0
Caldera Openlinux Eserver 2.3
Redhat Linux 7.0
Caldera Openlinux
Caldera Openlinux Edesktop 2.4
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
4 EDB exploits
770
VMScore
CVE-2003-0717
The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote malicious users to execute arbitrary code via a buffer overflow attack.
Microsoft Windows 2000
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows Me
Microsoft Windows 2003 Server Enterprise
4 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started