Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
use any font project use any font vulnerabilities and exploits
(subscribe to this query)
516
VMScore
CVE-2021-24977
The Use Any Font | Custom Font Uploader WordPress plugin prior to 6.2.1 does not have any authorisation checks when assigning a font, allowing unauthenticated users to sent arbitrary CSS which will then be processed by the frontend for all users. Due to the lack of sanitisation a...
Use Any Font Project Use Any Font
445
VMScore
CVE-2010-4577
The CSSParser::parseFontFaceSrc function in WebCore/css/CSSParser.cpp in WebKit, as used in Google Chrome prior to 8.0.552.224, Chrome OS prior to 8.0.552.343, webkitgtk prior to 1.2.6, and other products does not properly parse Cascading Style Sheets (CSS) token sequences, which...
Webkitgtk Webkitgtk
Google Chrome Os
Google Chrome
Fedoraproject Fedora 13
Debian Debian Linux 7.0
Debian Debian Linux 6.0
NA
CVE-2010-0474
Several vulnerabilities have been discovered in WebKit, a Web content engine library for GTK+. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-1783 WebKit does not properly handle dynamic modification of a text node, which allows remot...
605
VMScore
CVE-2010-4199
Google Chrome prior to 7.0.517.44 does not properly perform a cast of an unspecified variable during processing of an SVG use element, which allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a crafted SVG document.
Google Chrome
Debian Debian Linux 6.0
Debian Debian Linux 7.0
383
VMScore
CVE-2010-4493
Use-after-free vulnerability in Google Chrome prior to 8.0.552.215 allows remote malicious users to cause a denial of service via vectors related to the handling of mouse dragging events.
Google Chrome
Debian Debian Linux 6.0
Debian Debian Linux 7.0
668
VMScore
CVE-2010-4492
Use-after-free vulnerability in Google Chrome prior to 8.0.552.215 allows remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors involving SVG animations.
Google Chrome
Debian Debian Linux 6.0
Debian Debian Linux 7.0
828
VMScore
CVE-2010-1783
WebKit in Apple Safari prior to 5.0.1 on Mac OS X 10.5 up to and including 10.6 and Windows, and prior to 4.1.1 on Mac OS X 10.4; and webkitgtk prior to 1.2.6; does not properly handle dynamic modification of a text node, which allows remote malicious users to execute arbitrary c...
Apple Safari 4.0.4
Apple Safari 4.0.3
Apple Safari 4.0.1
Apple Safari 4.0
Apple Safari 4.0.0b
Apple Safari 4.0.2
Apple Safari
Apple Safari 4.0.5
Apple Webkit
890
VMScore
CVE-2010-2901
The rendering implementation in Google Chrome prior to 5.0.375.125 allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Google Chrome
Debian Debian Linux 6.0
Debian Debian Linux 7.0
668
VMScore
CVE-2011-0778
Google Chrome prior to 9.0.597.84 does not properly restrict drag and drop operations, which might allow remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
383
VMScore
CVE-2011-0482
Google Chrome prior to 8.0.552.237 and Chrome OS prior to 8.0.552.344 do not properly perform a cast of an unspecified variable during handling of anchors, which allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a crafted HTM...
Google Chrome Os
Google Chrome
Debian Debian Linux 6.0
Debian Debian Linux 7.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »