Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dos vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0016
Apache prior to 2.0.44, when running on unpatched Windows 9x and Me operating systems, allows remote malicious users to cause a denial of service or execute arbitrary code via an HTTP request containing MS-DOS device names.
Apache Http Server 2.0.42
Apache Http Server 2.0.37
Apache Http Server 2.0.39
Apache Http Server 2.0.41
Apache Http Server 2.0.38
Apache Http Server 2.0.40
Apache Http Server 2.0.36
Apache Http Server 2.0.43
NA
CVE-2008-2713
libclamav/petite.c in ClamAV prior to 0.93.1 allows remote malicious users to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.
Clam Anti-virus Clamav 0.15
Clam Anti-virus Clamav 0.52
Clam Anti-virus Clamav 0.53
Clam Anti-virus Clamav 0.54
Clam Anti-virus Clamav 0.70
Clam Anti-virus Clamav 0.71
Clam Anti-virus Clamav 0.22
Clam Anti-virus Clamav 0.23
Clam Anti-virus Clamav 0.65
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.74
Clam Anti-virus Clamav 0.75
Clam Anti-virus Clamav 0.81
Clam Anti-virus Clamav 0.81 Rc1
Clam Anti-virus Clamav 0.86
Clam Anti-virus Clamav 0.86.1
Clam Anti-virus Clamav 0.88.3
Clam Anti-virus Clamav 0.88.4
Clam Anti-virus Clamav 0.90 Rc1.1
Clam Anti-virus Clamav 0.90 Rc2
Clam Anti-virus Clamav 0.24
Clam Anti-virus Clamav 0.51
NA
CVE-2008-4551
strongSwan 4.2.6 and previous versions allows remote malicious users to cause a denial of service (daemon crash) via an IKE_SA_INIT message with a large number of NULL values in a Key Exchange payload, which triggers a NULL pointer dereference for the return value of the mpz_expo...
Strongswan Strongswan 4.2.0
Strongswan Strongswan 4.1.11
Strongswan Strongswan 4.1.4
Strongswan Strongswan 4.1.3
Strongswan Strongswan 4.0.4
Strongswan Strongswan 4.0.3
Strongswan Strongswan 4.0.2
Strongswan Strongswan 2.6.1
Strongswan Strongswan 2.6.0
Strongswan Strongswan 2.5.1
Strongswan Strongswan 2.5.0
Strongswan Strongswan 2.3.1
Strongswan Strongswan 2.2.2
Strongswan Strongswan 2.1.1
Strongswan Strongswan 2.1.0
Strongswan Strongswan 4.2.4
Strongswan Strongswan 4.2.3
Strongswan Strongswan 4.1.8
Strongswan Strongswan 4.1.7
Strongswan Strongswan 4.1.0
Strongswan Strongswan 4.0.7
Strongswan Strongswan 2.7.0
NA
CVE-2007-6220
typespeed prior to 0.6.4 allows remote malicious users to cause a denial of service (application crash) via unspecified network behavior that triggers a divide-by-zero error.
Typespeed Typespeed 0.6.3
Typespeed Typespeed 0.4.2
Typespeed Typespeed 0.4.4
Typespeed Typespeed 0.4.1
Typespeed Typespeed 0.4
NA
CVE-2013-1812
The ruby-openid gem prior to 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
Fedoraproject Fedora 18
Fedoraproject Fedora 17
Janrain Ruby-openid
Janrain Ruby-openid 2.2.0
NA
CVE-2011-4905
Apache ActiveMQ prior to 5.6.0 allows remote malicious users to cause a denial of service (file-descriptor exhaustion and broker crash or hang) by sending many openwire failover:tcp:// connection requests.
Apache Activemq 5.3.1
Apache Activemq 5.3.0
Apache Activemq 5.2.0
Apache Activemq 5.1.0
Apache Activemq 3.0
Apache Activemq 2.1
Apache Activemq 2.0
Apache Activemq 1.5
Apache Activemq
Apache Activemq 5.5.0
Apache Activemq 5.4.3
Apache Activemq 4.0.2
Apache Activemq 4.0.1
Apache Activemq 4.0
Apache Activemq 5.4.2
Apache Activemq 5.4.0
Apache Activemq 4.1.2
Apache Activemq 4.1.0
Apache Activemq 3.2.1
Apache Activemq 3.1
Apache Activemq 1.4
Apache Activemq 1.2
NA
CVE-2011-1002
avahi-core/socket.c in avahi-daemon in Avahi prior to 0.6.29 allows remote malicious users to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Avahi Avahi 0.6.25
Avahi Avahi 0.6.5
Avahi Avahi 0.6.20
Avahi Avahi 0.6.19
Avahi Avahi 0.5.2
Avahi Avahi 0.6.1
Avahi Avahi 0.6.13
Avahi Avahi 0.6.15
Avahi Avahi 0.6.7
Avahi Avahi 0.6.17
Avahi Avahi 0.6.16
Avahi Avahi 0.3
Avahi Avahi
Avahi Avahi 0.6.24
Avahi Avahi 0.6.23
Avahi Avahi 0.6.9
Avahi Avahi 0.2
Avahi Avahi 0.1
Avahi Avahi 0.6.14
Avahi Avahi 0.6.10
Avahi Avahi 0.6.27
Avahi Avahi 0.6.6
2 Nmap scripts
4 Github repositories
7.5
CVSSv3
CVE-2017-7924
An Improper Input Validation issue exists in Rockwell Automation MicroLogix 1100 controllers 1763-L16BWA, 1763-L16AWA, 1763-L16BBB, and 1763-L16DWD. A remote, unauthenticated attacker could send a single, specially crafted Programmable Controller Communication Commands (PCCC) pac...
Rockwellautomation 1763-l16bwa Firmware -
Rockwellautomation 1763-l16awa Firmware -
Rockwellautomation 1763-l16bbb Firmware -
Rockwellautomation 1763-l16dwd Firmware -
2 Metasploit modules
NA
CVE-2013-4613
The default configuration of the administrative interface on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers does not require authentication, which allows remote malicious users to modify the configuration by visiting the Advanced page. NOT...
Canon Mg3100 Printer -
Canon Mg6100 Printer -
Canon Mp340 Printer -
Canon Mx922 Printer -
Canon Mx870 Printer -
Canon Mx890 Printer -
Canon Mx920 Printer -
Canon Mg5300 Printer -
Canon Mp495 Printer -
NA
CVE-2013-4614
English/pages_MacUS/wls_set_content.html on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers shows the Wi-Fi PSK passphrase in cleartext, which allows physically proximate malicious users to obtain sensitive information by reading the screen...
Canon Mp340 Printer -
Canon Mx922 Printer -
Canon Mx870 Printer -
Canon Mx890 Printer -
Canon Mg5300 Printer -
Canon Mp495 Printer -
Canon Mx920 Printer -
Canon Mg3100 Printer -
Canon Mg6100 Printer -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »