Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
~fyodor vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-1999-0224
Denial of service in Windows NT messenger service through a long username.
Microsoft Windows Nt 4.0
1 EDB exploit
10
CVSSv2
CVE-2002-0436
sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote malicious users to execute arbitrary commands via shell metacharacters in the email address parameter.
Sun Sunos 5.7
Sun Solaris 7.0
Sun Sunos 5.8
Sun Solaris 8.0
1 EDB exploit
7.5
CVSSv2
CVE-2001-0419
Buffer overflow in shared library ndwfn4.so for iPlanet Web Server (iWS) 4.1, when used as a web listener for Oracle application server 4.0.8.2, allows remote malicious users to execute arbitrary commands via a long HTTP request that is passed to the application server, such as /...
Oracle Application Server 4.0.8.2
1 EDB exploit
7.2
CVSSv2
CVE-2001-1582
Buffer overflow in the LDAP naming services library (libsldap) in Sun Solaris 8 allows local users to execute arbitrary code via a long LDAP_OPTIONS environment variable to a privileged program that uses libsldap.
Sun Sunos 5.8
Sun Solaris 8.0
2 EDB exploits
7.6
CVSSv2
CVE-2006-5745
Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote malicious users to execute arbitrary code via crafted arguments that lead to mem...
Microsoft Xml Core Services 4.0
4 EDB exploits
7.5
CVSSv2
CVE-1999-0744
Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote malicious users to gain privileges via a long HTTP GET request.
Netscape Enterprise Server
Netscape Fasttrack Server
3 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started