Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jason geffner vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-45849
An arbitrary code execution which results in privilege escalation exists in Helix Core versions before 2023.2. Reported by Jason Geffner.
Perforce Helix Core
1 Article
7.5
CVSSv3
CVE-2023-5759
In Helix Core versions before 2023.2, an unauthenticated remote Denial of Service (DoS) via the buffer was identified. Reported by Jason Geffner.
Perforce Helix Core
1 Article
7.5
CVSSv3
CVE-2023-45319
In Helix Core versions before 2023.2, an unauthenticated remote Denial of Service (DoS) via the commit function was identified. Reported by Jason Geffner.
Perforce Helix Core
1 Article
7.5
CVSSv3
CVE-2023-35767
In Helix Core versions before 2023.2, an unauthenticated remote Denial of Service (DoS) via the shutdown function was identified. Reported by Jason Geffner.
Perforce Helix Core
1 Article
NA
CVE-2015-3456
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and previous versions and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_...
Qemu Qemu
Redhat Openstack 4.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Openstack 5.0
Redhat Openstack 7.0
Redhat Enterprise Virtualization 3.0
Redhat Enterprise Linux 5
Xen Xen 4.5.0
Redhat Openstack 6.0
1 EDB exploit
5 Github repositories
3 Articles
NA
CVE-2015-2756
QEMU, as used in Xen 3.3.x up to and including 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI...
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Xen Xen 4.4.0
Xen Xen 4.3.0
Xen Xen 4.5.0
Xen Xen 4.3.1
Xen Xen 4.3.2
Xen Xen 4.4.1
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
NA
CVE-2014-9718
The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 up to and including 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and sys...
Debian Debian Linux 8.0
Qemu Qemu 1.0
Qemu Qemu 2.0.0
Qemu Qemu 2.0.2
Qemu Qemu 1.1
Qemu Qemu 2.1.3
Qemu Qemu 2.1.0
Qemu Qemu 1.6.0
Qemu Qemu 1.5.0
Qemu Qemu 1.5.3
Qemu Qemu 1.5.1
Qemu Qemu 2.1.1
Qemu Qemu 1.5.2
Qemu Qemu 1.0.1
Qemu Qemu 1.7.1
Qemu Qemu 1.4.1
Qemu Qemu 1.4.2
Qemu Qemu 1.6.2
Qemu Qemu 1.6.1
Qemu Qemu 2.1.2
5.9
CVSSv3
CVE-2016-9892
The esets_daemon service in ESET Endpoint Antivirus for macOS prior to 6.4.168.0 and Endpoint Security for macOS prior to 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle malicious users to spoof this server an...
Eset Endpoint Security 6.3.70.1
Eset Endpoint Antivirus 6.3.70.1
9.8
CVSSv3
CVE-2016-0718
Expat allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
Mozilla Firefox
Apple Mac Os X
Suse Linux Enterprise Server 11
Suse Studio Onsite 1.3
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Debuginfo 11
Opensuse Leap 42.1
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Libexpat Project Libexpat
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mcafee Policy Auditor
Python Python
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started