Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
login security project login security vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2014-1236
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote malicious users to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Graphviz Graphviz 2.34.0
10
CVSSv2
CVE-2013-1493
The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and previous versions, 6 Update 41 and previous versions, and 5.0 Update 40 and previous versions allows remote malicious users to execute arbitrary code or cause a denial of service (crash...
Oracle Jre 1.7.0
Oracle Jre
Sun Jre 1.5.0
Oracle Jre 1.5.0
Sun Jdk 1.6.0
Oracle Jdk 1.6.0
Oracle Jdk
Sun Jre 1.6.0
Oracle Jre 1.6.0
Sun Jdk 1.5.0
Oracle Jdk 1.5.0
Oracle Jdk 1.7.0
1 EDB exploit
3 Articles
10
CVSSv2
CVE-2013-0809
Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and previous versions, 6 Update 41 and previous versions, and 5.0 Update 40 and previous versions allows remote malicious users to execute arbitrary code vi...
Sun Jre 1.6.0
Oracle Jre 1.6.0
Oracle Jre
Sun Jdk 1.6.0
Oracle Jdk 1.6.0
Oracle Jdk
Sun Jre 1.5.0
Oracle Jre 1.5.0
Sun Jdk 1.5.0
Oracle Jdk 1.5.0
Oracle Jre 1.7.0
Oracle Jdk 1.7.0
10
CVSSv2
CVE-2013-0422
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote malicious users to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary...
Oracle Jre 1.7.0
Oracle Jdk 1.7.0
Canonical Ubuntu Linux 12.10
Opensuse Opensuse 12.2
1 EDB exploit
16 Github repositories
8 Articles
10
CVSSv2
CVE-2009-0165
Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and previous versions, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."
Foolabs Xpdf 0.91a
Glyphandcog Xpdfreader 0.90
Glyphandcog Xpdfreader 0.4
Glyphandcog Xpdfreader 0.3
Glyphandcog Xpdfreader 1.01
Foolabs Xpdf 0.93c
Foolabs Xpdf 0.92d
Foolabs Xpdf 0.92a
Foolabs Xpdf 0.92b
Glyphandcog Xpdfreader
Glyphandcog Xpdfreader 3.01
Glyphandcog Xpdfreader 0.91
Glyphandcog Xpdfreader 0.6
Foolabs Xpdf 0.5a
Glyphandcog Xpdfreader 2.03
Glyphandcog Xpdfreader 2.00
Foolabs Xpdf 0.92e
Glyphandcog Xpdfreader 0.93
Glyphandcog Xpdfreader 0.80
Foolabs Xpdf 0.7a
Glyphandcog Xpdfreader 0.92
Glyphandcog Xpdfreader 0.2
10
CVSSv2
CVE-2008-3522
Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent malicious users to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
Redhat Enterprise Virtualization 3.5
Jasper Project Jasper 1.900.1
10
CVSSv2
CVE-2007-0956
The telnet daemon (telnetd) in MIT krb5 prior to 1.6.1 allows remote malicious users to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
Mit Kerberos 5
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
9.3
CVSSv2
CVE-2019-12735
getchar.c in Vim prior to 8.1.1365 and Neovim prior to 0.3.6 allows remote malicious users to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
Vim Vim
Neovim Neovim
1 EDB exploit
6 Github repositories
1 Article
9.3
CVSSv2
CVE-2015-7801
Use-after-free vulnerability in OptiPNG 0.6.4 allows remote malicious users to execute arbitrary code via a crafted PNG file.
Optipng Project Optipng
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 12.04
9.3
CVSSv2
CVE-2015-8540
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 up to and including 0.99, 1.0.x prior to 1.0.66, 1.1.x and 1.2.x prior to 1.2.56, 1.3.x and 1.4.x prior to 1.4.19, and 1.5.x prior to 1.5.26 allows remote malicious users to have unspecified impact v...
Redhat Enterprise Linux Desktop Supplementary 6.0
Redhat Enterprise Linux Server Supplementary 6.0
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Workstation Supplementary 6.0
Redhat Enterprise Linux Server Supplementary 5.0
Redhat Enterprise Linux Desktop Supplementary 5.0
Libpng Libpng 1.2.14
Libpng Libpng 1.2.45
Libpng Libpng 1.2.46
Libpng Libpng 1.2.33
Libpng Libpng 1.2.16
Libpng Libpng 1.2.35
Libpng Libpng 1.2.29
Libpng Libpng 1.2.26
Libpng Libpng 1.2.54
Libpng Libpng 1.2.7
Libpng Libpng 1.2.43
Libpng Libpng 1.2.2
Libpng Libpng 1.2.4
Libpng Libpng 1.2.22
Libpng Libpng 1.2.39
Libpng Libpng 1.2.48
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »