Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
yelp vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2018-10406
An issue exists in Yelp OSXCollector. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malic...
Yelp Osxcollector
8.8
CVSSv3
CVE-2023-0263
The WP Yelp Review Slider WordPress plugin prior to 7.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
Ljapps Wp Yelp Review Slider
NA
CVE-2008-3533
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and prior to 2.24 allows remote malicious users to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp wi...
Gnome Yelp
Gnome Gnome 2.20
Gnome Gnome 2.22
1 EDB exploit
NA
CVE-2008-5913
The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote malicious users...
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.8
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
NA
CVE-2010-1121
Mozilla Firefox 3.6.x prior to 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote malicious users to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interacti...
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.1
Mozilla Firefox 3.6
NA
CVE-2010-1125
The JavaScript implementation in Mozilla Firefox 3.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, allows remote malicious users to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via cer...
Mozilla Firefox 3.6.2
Mozilla Firefox 3.5.3
Mozilla Firefox 3.0.7
Mozilla Firefox 3.0.9
Mozilla Firefox 3.5.6
Mozilla Firefox 3.0.8
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.0.4
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.0.5
Mozilla Firefox 3.5.1
Mozilla Firefox 3.0.14
Mozilla Firefox 3.5.2
Mozilla Firefox 3.0.10
Mozilla Firefox 3.0.12
Mozilla Firefox 3.0.3
Mozilla Firefox 3.0.15
Mozilla Firefox 3.0
Mozilla Firefox 3.0.1
NA
CVE-2010-1203
The JavaScript engine in Mozilla Firefox 3.6.x prior to 3.6.4 allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6
NA
CVE-2010-1196
Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, Thunderbird prior to 3.0.5, and SeaMonkey prior to 2.0.5 allows remote malicious users to execute arbitrary code via a DOM node with a long te...
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 2.0
NA
CVE-2010-1198
Use-after-free vulnerability in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, allows remote malicious users to execute arbitrary code via vectors involving multiple plugin instances.
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 2.0
NA
CVE-2010-1201
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x prior to 3.5.10, Thunderbird prior to 3.0.5, and SeaMonkey prior to 2.0.5 allows remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary co...
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »