Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
shahin vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-1900
Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and Works 9 do not properly handle malforme...
Microsoft Word 2003
Microsoft Word 2007
Microsoft Word 2002
Microsoft Office 2008
Microsoft Open Xml File Format Converter
Microsoft Office 2004
Microsoft Office Compatibility Pack 2007
Microsoft Works 9.0
Microsoft Office Word Viewer
1 EDB exploit
NA
CVE-2010-2752
Integer overflow in an array class in Mozilla Firefox 3.5.x prior to 3.5.11 and 3.6.x prior to 3.6.7, Thunderbird 3.0.x prior to 3.0.6 and 3.1.x prior to 3.1.1, and SeaMonkey prior to 2.0.6 allows remote malicious users to execute arbitrary code by placing many Cascading Style Sh...
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.5
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.6
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.3
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.3
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.10
Mozilla Firefox 3.6.1
Mozilla Thunderbird 3.1
Mozilla Thunderbird 3.0
Mozilla Thunderbird 3.0.1
Mozilla Thunderbird 3.0.4
Mozilla Thunderbird 3.0.5
Mozilla Thunderbird 3.0.2
Mozilla Thunderbird 3.0.3
Mozilla Seamonkey 1.0.5
1 EDB exploit
NA
CVE-2010-2168
Adobe Reader and Acrobat 9.x prior to 9.3.3, and 8.x prior to 8.2.3 on Windows and Mac OS X, allow malicious users to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that ...
Adobe Acrobat 9.1.2
Adobe Acrobat 9.1.3
Adobe Acrobat 9.2
Adobe Acrobat 9.1
Adobe Acrobat 9.1.1
Adobe Acrobat 9.0
Adobe Acrobat 9.3.2
Adobe Acrobat 9.3
Adobe Acrobat 9.3.1
Adobe Acrobat Reader 9.3
Adobe Acrobat Reader 9.3.1
Adobe Acrobat Reader 9.1.3
Adobe Acrobat Reader 9.2
Adobe Acrobat Reader 9.1.1
Adobe Acrobat Reader 9.1.2
Adobe Acrobat Reader 9.0
Adobe Acrobat Reader 9.1
Adobe Acrobat Reader 9.3.2
Adobe Acrobat 8.0
Adobe Acrobat 8.1.6
Adobe Acrobat 8.1.7
Adobe Acrobat 8.1.4
1 EDB exploit
NA
CVE-2010-2201
Adobe Reader and Acrobat 9.x prior to 9.3.3, and 8.x prior to 8.2.3 on Windows and Mac OS X, allow malicious users to execute arbitrary code via a PDF file with crafted Flash content involving the (1) pushstring (0x2C) operator, (2) debugfile (0xF1) operator, and an "invalid...
Adobe Acrobat 9.0
Adobe Acrobat 9.1
Adobe Acrobat 9.3.2
Adobe Acrobat 9.3
Adobe Acrobat 9.3.1
Adobe Acrobat 9.1.1
Adobe Acrobat 9.1.2
Adobe Acrobat 9.1.3
Adobe Acrobat 9.2
Adobe Acrobat Reader 9.1.2
Adobe Acrobat Reader 9.1.3
Adobe Acrobat Reader 9.0
Adobe Acrobat Reader 9.1
Adobe Acrobat Reader 9.1.1
Adobe Acrobat Reader 9.2
Adobe Acrobat Reader 9.3
Adobe Acrobat Reader 9.3.1
Adobe Acrobat Reader 9.3.2
Adobe Acrobat 8.1.4
Adobe Acrobat 8.1.5
Adobe Acrobat 8.1.2
Adobe Acrobat 8.1.3
1 EDB exploit
NA
CVE-2010-0520
Heap-based buffer overflow in QuickTimeAuthoring.qtx in QuickTime in Apple Mac OS X prior to 10.6.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted FLC file, related to crafted DELTA_FLI chunks and untrusted l...
Apple Mac Os X 10.6.0
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.2
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.2
1 EDB exploit
NA
CVE-2010-0838
Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from t...
Sun Jre
Sun Jre 1.6.0
Sun Jdk 1.6.0
Sun Jdk
Sun Jdk 1.5.0
Sun Jre 1.5.0
1 EDB exploit
NA
CVE-2010-1246
Stack-based buffer overflow in Microsoft Office Excel 2002 SP3 allows remote malicious users to execute arbitrary code via an Excel file with a malformed RTD (0x813) record, aka "Excel RTD Memory Corruption Vulnerability."
Microsoft Excel 2002
1 EDB exploit
NA
CVE-2010-2738
The Uniscribe (aka new Unicode Script Processor) implementation in USP10.DLL in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2, and Microsoft Office XP SP3, 2003 SP3, and 2007 SP2, does not properly validate tables associated wi...
Microsoft Windows Server 2008
Microsoft Windows Server 2008 -
Microsoft Windows Xp -
Microsoft Windows Vista -
Microsoft Windows Xp
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Office Xp
Microsoft Office 2007
Microsoft Office 2003
1 EDB exploit
NA
CVE-2010-3000
Multiple integer overflows in the ParseKnownType function in RealNetworks RealPlayer 11.0 up to and including 11.1 and RealPlayer SP 1.0 up to and including 1.1.4 on Windows allow remote malicious users to execute arbitrary code via crafted (1) HX_FLV_META_AMF_TYPE_MIXEDARRAY or ...
Realnetworks Realplayer 11.1
Realnetworks Realplayer 11.0
Realnetworks Realplayer Sp 1.0.5
Realnetworks Realplayer Sp 1.1
Realnetworks Realplayer Sp 1.0.1
Realnetworks Realplayer Sp 1.0.2
Realnetworks Realplayer Sp 1.0.0
Realnetworks Realplayer Sp 1.1.1
Realnetworks Realplayer Sp 1.1.4
Realnetworks Realplayer Sp 1.1.3
Realnetworks Realplayer Sp 1.1.2
1 EDB exploit
NA
CVE-2010-0519
Integer overflow in QuickTime in Apple Mac OS X prior to 10.6.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a FlashPix image with a malformed SubImage Header Stream containing a NumberOfTiles field with a large valu...
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.2
Apple Mac Os X 10.6.0
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.2
Apple Mac Os X Server 10.6.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »