Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
peter vreugdenhil vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-1118
Unspecified vulnerability in Internet Explorer 8 on Microsoft Windows 7 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to a use-after-free issue, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.
Microsoft Internet Explorer 8
NA
CVE-2010-1117
Heap-based buffer overflow in Internet Explorer 8 on Microsoft Windows 7 allows remote malicious users to discover the base address of a Windows .dll file, and possibly have unspecified other impact, via unknown vectors, as demonstrated by Peter Vreugdenhil during a Pwn2Own compe...
Microsoft Internet Explorer 8.0.6001
NA
CVE-2005-1527
Eval injection vulnerability in awstats.pl in AWStats 6.4 and previous versions, when a URLPlugin is enabled, allows remote malicious users to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
Awstats Awstats
Canonical Ubuntu Linux 5.04
Debian Debian Linux 3.1
Debian Debian Linux 3.0
NA
CVE-2011-0027
Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote malicious users to execute arbitrary code, possibly via a large CacheSize propert...
Microsoft Data Access Components 2.8
Microsoft Windows Data Access Components 6.0
1 EDB exploit
NA
CVE-2006-5650
The ICQPhone.SipxPhoneManager ActiveX control in America Online ICQ 5.1 allows remote malicious users to download and execute arbitrary code via the DownloadAgent function, as demonstrated using an ICQ avatar.
Aol Icq 5.1
2 EDB exploits
1 Github repository
NA
CVE-2010-0842
Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was...
Sun Jre 1.6.0
Sun Jre
Sun Jdk 1.6.0
Sun Jdk
Sun Jdk 1.5.0
Sun Sdk 1.4.2
Sun Sdk 1.4.2 14
Sun Sdk 1.4.2 15
Sun Sdk 1.4.2 6
Sun Sdk 1.4.2 7
Sun Sdk 1.4.2 24
Sun Sdk
Sun Sdk 1.4.2 02
Sun Sdk 1.4.2 1
Sun Sdk 1.4.2 16
Sun Sdk 1.4.2 17
Sun Sdk 1.4.2 8
Sun Sdk 1.4.2 9
Sun Sdk 1.4.2 12
Sun Sdk 1.4.2 13
Sun Sdk 1.4.2 4
Sun Sdk 1.4.2 5
1 EDB exploit
2 Articles
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started