Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
random text project random text vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-0388
The Random Text WordPress plugin up to and including 0.3.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscribers.
Random Text Project Random Text
9.8
CVSSv3
CVE-2018-18531
text/impl/DefaultTextCreator.java, text/impl/ChineseTextProducer.java, and text/impl/FiveLetterFirstNameTextCreator.java in kaptcha 2.3.2 use the Random (rather than SecureRandom) function for generating CAPTCHA values, which makes it easier for remote malicious users to bypass i...
Kaptcha Project Kaptcha 2.3.2
2 Github repositories
6.4
CVSSv3
CVE-2017-1000367
Todd Miller's sudo version 1.8.20 and previous versions is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
Sudo Project Sudo
1 EDB exploit
4 Github repositories
NA
CVE-2006-2444
The snmp_trap_decode function in the SNMP NAT helper for Linux kernel prior to 2.6.16.18 allows remote malicious users to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2)...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.15
1 EDB exploit
5.3
CVSSv3
CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of d...
Golang Go
10
CVSSv3
CVE-2024-3094
Malicious code exists in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific fun...
Tukaani Xz 5.6.1
Tukaani Xz 5.6.0
80 Github repositories
6 Articles
NA
CVE-2011-1577
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and previous versions allows physically proximate malicious users to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI ...
Linux Linux Kernel 2.6.21.3
Linux Linux Kernel 2.6.21.7
Linux Linux Kernel 2.6.20.5
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.14
Linux Linux Kernel 2.6.20.15
Linux Linux Kernel 2.6.20.19
Linux Linux Kernel 2.6.20.1
Linux Linux Kernel 2.6.19.1
Linux Linux Kernel 2.6.19.3
Linux Linux Kernel 2.6.18.1
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.18.8
Linux Linux Kernel 2.6.17.4
Linux Linux Kernel 2.6.17.13
Linux Linux Kernel 2.6.17.10
Linux Linux Kernel 2.6.17.11
Linux Linux Kernel 2.6.16.7
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.16.49
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started