Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zhodiac vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-1026
Multiple buffer overflows in LBNL tcpdump allow remote malicious users to execute arbitrary commands.
Lbl Tcpdump 3.4
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5 Alpha
1 EDB exploit
NA
CVE-2000-0012
Buffer overflow in w3-msql CGI program in miniSQL package allows remote malicious users to execute commands.
Hughes Msql 2.0.11
1 EDB exploit
NA
CVE-2000-0096
Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.
Qualcomm Qpopper 3.0beta15
Qualcomm Qpopper 3.0beta16
Qualcomm Qpopper 3.0beta17
Qualcomm Qpopper 3.0beta18
Qualcomm Qpopper 3.0beta19
Qualcomm Qpopper 3.0beta4
Qualcomm Qpopper 3.0beta5
Qualcomm Qpopper 3.0beta6
Qualcomm Qpopper 3.0beta7
Qualcomm Qpopper 3.0
Qualcomm Qpopper 3.0beta1
Qualcomm Qpopper 3.0beta10
Qualcomm Qpopper 3.0beta23
Qualcomm Qpopper 3.0beta24
Qualcomm Qpopper 3.0beta25
Qualcomm Qpopper 3.0beta26
Qualcomm Qpopper 3.0beta11
Qualcomm Qpopper 3.0beta13
Qualcomm Qpopper 3.0beta2
Qualcomm Qpopper 3.0beta21
Qualcomm Qpopper 3.0beta28
Qualcomm Qpopper 3.0beta3
1 EDB exploit
NA
CVE-1999-0405
A buffer overflow in lsof allows local users to obtain root privilege.
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.8
Suse Suse Linux 6.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Suse Suse Linux 4.2
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 4.4.1
Suse Suse Linux 5.0
Debian Debian Linux 2.0
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Suse Suse Linux 5.1
Suse Suse Linux 5.3
Debian Debian Linux 2.0.5
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started