Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
delegate delegate 7.8.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2001-1202
Cross-site scripting vulnerability in DeleGate 7.7.0 and 7.7.1 does not quote scripting commands within a "403 Forbidden" error page, which allows remote malicious users to execute arbitrary Javascript on other clients via a URL that generates an error.
Delegate Delegate 7.8.0
Delegate Delegate 7.8.1
Delegate Delegate 7.7.1
Delegate Delegate 7.7.0
1 EDB exploit
7.5
CVSSv2
CVE-2002-1781
Multiple buffer overflows in DeleGate 7.7.0 up to and including 7.8.1 allow remote malicious users to execute arbitrary code, as demonstrated using a long USER command to the POP proxy.
Delegate Delegate 7.8.0
Delegate Delegate 7.8.1
Delegate Delegate 7.7.1
Delegate Delegate 7.7.0
7.5
CVSSv2
CVE-2004-2003
Buffer overflow in the ssl_prcert function in the SSLway filter (sslway.c) for DeleGate 8.9.2 and previous versions allows remote malicious users to execute arbitrary code via a certificate with a long (1) subject or (2) issuer name field.
Delegate Delegate 8.9.2
Delegate Delegate 8.3.3
Delegate Delegate 8.4.0
Delegate Delegate 7.8.0
Delegate Delegate 8.3.4
Delegate Delegate 8.5.0
Delegate Delegate 7.8.1
Delegate Delegate 8.9.1
Delegate Delegate 7.9.11
Delegate Delegate 7.7.1
Delegate Delegate 7.7.0
Delegate Delegate 8.9
Delegate Delegate 7.8.2
1 EDB exploit
5
CVSSv2
CVE-2005-0036
The DNS implementation in DeleGate 8.10.2 and previous versions allows remote malicious users to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
Delegate Delegate 8.9.2
Delegate Delegate 8.3.3
Delegate Delegate
Delegate Delegate 8.10.1
Delegate Delegate 8.10
Delegate Delegate 8.4.0
Delegate Delegate 7.8.0
Delegate Delegate 8.9.6
Delegate Delegate 8.3.4
Delegate Delegate 8.5.0
Delegate Delegate 7.8.1
Delegate Delegate 8.9.1
Etl Delegate 6.0
Delegate Delegate 7.9.11
Delegate Delegate 7.7.1
Delegate Delegate 7.7.0
Delegate Delegate 8.9.4
Etl Delegate 5.9
Delegate Delegate 8.9.5
Delegate Delegate 8.9
Delegate Delegate 7.8.2
Delegate Delegate 5.9.3
5
CVSSv2
CVE-2006-2072
Multiple unspecified vulnerabilities in DeleGate 9.x prior to 9.0.6 and 8.x prior to 8.11.6 allow remote malicious users to cause a denial of service via crafted DNS responses messages that cause (1) a buffer over-read or (2) infinite recursion, which can trigger a segmentation f...
Delegate Delegate 8.9.2
Delegate Delegate 8.3.3
Delegate Delegate 8.11.3
Delegate Delegate 9.0.4
Delegate Delegate 8.10.3
Delegate Delegate 8.10.1
Delegate Delegate 8.10
Delegate Delegate 9.0
Delegate Delegate 8.4.0
Delegate Delegate 7.8.0
Delegate Delegate 8.9.6
Delegate Delegate 8.3.4
Delegate Delegate 9.0.5
Delegate Delegate 8.11.2
Delegate Delegate 8.10.2
Delegate Delegate 8.5.0
Delegate Delegate 9.0.1
Delegate Delegate 7.8.1
Delegate Delegate 8.9.1
Delegate Delegate 7.9.11
Delegate Delegate 7.7.1
Delegate Delegate 9.0.2
5
CVSSv2
CVE-2004-0789
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and previous versions as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x prior to 2.2.3 and 3.5.x prior to 3.5.2, allow remote malicious users to cause a ...
Delegate Delegate 8.9.2
Qbik Wingate 6.0.1 Build 993
Delegate Delegate 8.3.3
Dnrd Dnrd 2.5
Posadis Posadis 0.50.4
Posadis Posadis 0.60.0
Maradns Maradns 0.8.05
Don Moore Mydns 0.7
Maradns Maradns 0.5.30
Delegate Delegate 8.4.0
Delegate Delegate 7.8.0
Qbik Wingate 6.0
Dnrd Dnrd 2.9
Delegate Delegate 8.3.4
Dnrd Dnrd 2.3
Dnrd Dnrd 1.1
Posadis Posadis 0.50.7
Pliant Pliant Dns Server
Qbik Wingate 6.0.1 Build 995
Maradns Maradns 0.5.29
Delegate Delegate 8.5.0
Posadis Posadis 0.50.6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started