Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
random text project random text vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-0388
The Random Text WordPress plugin up to and including 0.3.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscribers.
Random Text Project Random Text
446
VMScore
CVE-2018-18531
text/impl/DefaultTextCreator.java, text/impl/ChineseTextProducer.java, and text/impl/FiveLetterFirstNameTextCreator.java in kaptcha 2.3.2 use the Random (rather than SecureRandom) function for generating CAPTCHA values, which makes it easier for remote malicious users to bypass i...
Kaptcha Project Kaptcha 2.3.2
2 Github repositories
785
VMScore
CVE-2006-2444
The snmp_trap_decode function in the SNMP NAT helper for Linux kernel prior to 2.6.16.18 allows remote malicious users to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2)...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.15
1 EDB exploit
NA
CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of d...
Golang Go
428
VMScore
CVE-2019-11358
jQuery prior to 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Jquery Jquery
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Drupal Drupal
Backdropcms Backdrop
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Netapp Snapcenter -
Netapp Oncommand System Manager
Redhat Cloudforms 4.7
Redhat Virtualization Manager 4.3
Oracle Service Bus 12.1.3.0.0
Oracle Primavera Unifier 16.2
Oracle Jd Edwards Enterpriseone Tools 9.2
Oracle Weblogic Server 12.1.3.0.0
Oracle Service Bus 11.1.1.9.0
Oracle Jdeveloper 11.1.1.9.0
Oracle Primavera Unifier 16.1
151 Github repositories
436
VMScore
CVE-2011-1577
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and previous versions allows physically proximate malicious users to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI ...
Linux Linux Kernel 2.6.21.3
Linux Linux Kernel 2.6.21.7
Linux Linux Kernel 2.6.20.5
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.14
Linux Linux Kernel 2.6.20.15
Linux Linux Kernel 2.6.20.19
Linux Linux Kernel 2.6.20.1
Linux Linux Kernel 2.6.19.1
Linux Linux Kernel 2.6.19.3
Linux Linux Kernel 2.6.18.1
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.18.8
Linux Linux Kernel 2.6.17.4
Linux Linux Kernel 2.6.17.13
Linux Linux Kernel 2.6.17.10
Linux Linux Kernel 2.6.17.11
Linux Linux Kernel 2.6.16.7
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.16.49
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started