Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zenith parsec vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0775
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote malicious users to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Xli Xli 1.16
Xli Xli 1.17
Xloadimage Xloadimage 4.1
1 EDB exploit
NA
CVE-2001-0641
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Redhat Linux 5.2
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.0
Suse Suse Linux 6.1
1 EDB exploit
NA
CVE-2001-1002
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and previous versions does not run dvips in secure mode when dvips is executed by lpd, which could allow remote malicious users to gain privileges by printing a DVI file that contains malicious command...
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
1 EDB exploit
1 Github repository
NA
CVE-2000-0787
IRC Xchat client versions 1.4.2 and previous versions allows remote malicious users to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
Xchat Xchat 1.3.13
Xchat Xchat 1.4
Xchat Xchat 1.2.1
Xchat Xchat 1.3.10
Xchat Xchat 1.3.11
Xchat Xchat 1.3.12
Xchat Xchat 1.4.2
Xchat Xchat 1.5.6
Xchat Xchat 1.5.xdev
Xchat Xchat 1.3.9
Xchat Xchat 1.4.1
1 EDB exploit
NA
CVE-2000-0829
The tmpwatch utility in Red Hat Linux forks a new process for each directory level, which allows local users to cause a denial of service by creating deeply nested directories in /tmp or /var/tmp/.
Redhat Linux 6.1
Redhat Tmpwatch 2.2
Redhat Tmpwatch 2.5.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started