Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jack vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0833
Buffer overflow in WinSMTP 1.06f and 2.X allows remote malicious users to cause a denial of service via a long (1) USER or (2) HELO command.
Jack De Winter Winsmtp 1.6f
Jack De Winter Winsmtp 2.x
1 EDB exploit
9.8
CVSSv3
CVE-2021-4279
A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The att...
Starcounter-jack Json-patch
NA
CVE-2007-2285
Directory traversal vulnerability in examples/layout/feed-proxy.php in Jack Slocum Ext 1.0 alpha1 (Ext JS) allows remote malicious users to read arbitrary files via a .. (dot dot) in the feed parameter. NOTE: analysis by third party researchers indicates that this issue might be ...
Jack Slocum Ext Js 1.0 Alpha1
1 EDB exploit
NA
CVE-2014-5779
The Jack'd - Gay Chat & Dating (aka mobi.jackd.android) application 1.9.0a for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Jackdapp Jack\\'d - Gay Chat \\& Dating 1.9.0a
NA
CVE-2004-1395
The Lithtech engine, as used in (1) Contract Jack 1.1 and previous versions, (2) No one lives forever 2 1.3 and previous versions, (3) Tron 2.0 1.042 and previous versions, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote malicious users t...
Monolith Productions Tron 2.0.1.0
Monolith Productions Tron 2.0.1.42
Monolith Productions Contract Jack 1.1
Monolith Productions No One Lives Forever 2 1.0.004
Monolith Productions No One Lives Forever 2 1.3
1 EDB exploit
NA
CVE-2004-1500
Format string vulnerability in the Lithtech engine, as used in multiple games, allows remote authenticated users to cause a denial of service (application crash) via format string specifiers in (1) a nickname or (2) a message.
Monolith Productions Contract Jack 1.1
Monolith Productions Global Operations 2.0
Monolith Productions Shogo 2.2
Monolith Productions Tron 2.0.1.42
Monolith Productions Global Operations 2.1
Monolith Productions Kiss Psycho Circus 1.13
Freeform Interactive Purge Jihad 2.2.1
Monolith Productions Legends Of Might And Magic 1.1
Monolith Productions No One Lives Forever 1.0.004
Monolith Productions Alien Versus Predator 2.1.0.9.6
Monolith Productions Blood 2.2.1
Monolith Productions No One Lives Forever 2.1.3
Monolith Productions Sanity 1.0
1 EDB exploit
NA
CVE-2008-6562
Cross-site scripting (XSS) vulnerability in jax_linklists.php in Jack (tR) Jax LinkLists 1.00 allows remote malicious users to inject arbitrary web script or HTML via the cat parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from thir...
Jax Scripts Jax Linklists 1.00
2 EDB exploits
10
CVSSv3
CVE-2019-12643
A vulnerability in the Cisco REST API virtual service container for Cisco IOS XE Software could allow an unauthenticated, remote malicious user to bypass authentication on the managed Cisco IOS XE device. The vulnerability is due to an improper check performed by the area of code...
Cisco Ios Xe 16.6.5
Cisco Ios Xe 15.5\\(3\\)s3.16
1 Article
NA
CVE-2004-0408
Buffer overflow in the child_service function in the ident2 ident daemon allows remote malicious users to execute arbitrary code.
Michael Bacarella Ident2 1.3
Michael Bacarella Ident2 1.3 1
Michael Bacarella Ident2 1.4
Michael Bacarella Ident2 .999c
9.8
CVSSv3
CVE-2016-11038
An issue exists on Samsung mobile devices with software through 2016-04-05 (incorporating the Samsung Professional Audio SDK). The Jack audio service doesn't implement access control for shared memory, leading to arbitrary code execution or privilege escalation. The Samsung ...
Google Android -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »