Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
w3c vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2004-2274
Unknown vulnerability in Jigsaw prior to 2.2.4 has unknown impact and attack vectors, possibly related to the parsing of the URI.
W3c Jigsaw 2.1
W3c Jigsaw 2.1.1
W3c Jigsaw 2.0.4
W3c Jigsaw 2.0.5
W3c Jigsaw 2.2.3
W3c Jigsaw 2.0.2
W3c Jigsaw 2.0.3
W3c Jigsaw 2.2.1
W3c Jigsaw 2.2.2
W3c Jigsaw 2.0
W3c Jigsaw 2.0.1
W3c Jigsaw 2.1.2
W3c Jigsaw 2.2
10
CVSSv2
CVE-2008-6005
Multiple buffer overflows in the CheckUniqueName function in W3C Amaya Web Browser 10.0.1, and possibly other versions including 11.0.1, might allow remote malicious users to execute arbitrary code via "duplicated" attribute value inputs.
W3c Amaya Web Browser 11.0.1
W3c Amaya Web Browser 10.0.1
4.3
CVSSv2
CVE-2005-3183
The HTBoundary_put_block function in HTBound.c for W3C libwww (w3c-libwww) allows remote servers to cause a denial of service (segmentation fault) via a crafted multipart/byteranges MIME message that triggers an out-of-bounds read.
W3c Libwww
7.6
CVSSv2
CVE-2006-1900
Multiple buffer overflows in World Wide Web Consortium (W3C) Amaya 9.4, and possibly other versions including 8.x prior to 8.8.5, allow remote malicious users to execute arbitrary code via a long value in (1) the COMPACT attribute of the COLGROUP element, (2) the ROWS attribute o...
W3c Amaya 9.4
2 EDB exploits
5
CVSSv2
CVE-2002-1052
Jigsaw 2.2.1 on Windows systems allows remote malicious users to use MS-DOS device names in HTTP requests to (1) cause a denial of service using the "con" device, or (2) obtain the physical path of the server using two requests to the "aux" device.
W3c Jigsaw 2.2.1
6.8
CVSSv2
CVE-2002-1053
Cross-site scripting (XSS) vulnerability in W3C Jigsaw Proxy Server prior to 2.2.1 allows remote malicious users to execute arbitrary script via a URL that contains a reference to a nonexistent host followed by the script, which is included in the resulting error message.
W3c Jigsaw 2.2
3.5
CVSSv2
CVE-2020-4070
In CSS Validator less than or equal to commit 54d68a1, there is a cross-site scripting vulnerability in handling URIs. A user would have to click on a specifically crafted validator link to trigger it. This has been patched in commit e5c09a9.
W3c Css Validator
4.3
CVSSv2
CVE-2002-1445
Cross-site scripting (XSS) vulnerability in CERN Proxy Server allows remote malicious users to execute script as other users via a link to a non-existent page whose name contains the script, which is inserted into the resulting error page.
W3c Cern Httpd 3.0
1 EDB exploit
7.5
CVSSv2
CVE-2000-0079
The W3C CERN httpd HTTP server allows remote malicious users to determine the real pathnames of some commands via a request for a nonexistent URL.
W3c Cern Httpd 3.0
10
CVSSv2
CVE-2008-5282
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0.1 allow remote malicious users to execute arbitrary code via (1) a link with a long HREF attribute, and (2) a DIV tag with a long id attribute.
W3c Amaya Web Browser 10.0.1
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32744
privilege escalation
CVE-2024-30253
CVE-2024-3914
cross-site scripting
CVE-2024-31497
CVE-2024-3400
CVE-2024-32341
hardcoded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »