Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
core security technologies vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-3274
Multiple cross-site scripting (XSS) vulnerabilities in EmployeeSearch.cc in the Employee Search Engine in ZOHO ManageEngine ADSelfService Plus prior to 4.5 Build 4500 allow remote malicious users to inject arbitrary web script or HTML via the searchString parameter in a (1) showL...
Zohocorp Manageengine Adselfservice Plus
1 EDB exploit
NA
CVE-2009-1729
Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Communications Express 6 2005Q4 (aka 6.2) and 6.3 allow remote malicious users to inject arbitrary web script or HTML via (1) the abperson_displayName parameter to uwc/abs/search.xml in the Add Contact impleme...
Sun Java System Communications Express 6.3
Sun Java System Communications Express 6.2
2 EDB exploits
NA
CVE-2007-5269
Certain chunk handlers in libpng prior to 1.0.29 and 1.2.x prior to 1.2.21 allow remote malicious users to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT...
Libpng Libpng 1.0.28
Libpng Libpng
NA
CVE-2010-2709
Stack-based buffer overflow in webappmon.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote malicious users to execute arbitrary code via a long OvJavaLocale value in a cookie.
Hp Openview Network Node Manager 7.51
Hp Openview Network Node Manager 7.53
2 EDB exploits
NA
CVE-2009-2334
wp-admin/admin.php in WordPress and WordPress MU prior to 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote malicious users to specify a configuration file in the page parameter to obtain sensitive information or mod...
Wordpress Wordpress 2.3.3
Wordpress Wordpress 2.3.2
Wordpress Wordpress 2.2.2
Wordpress Wordpress 2.2.1
Wordpress Wordpress 2.1.1
Wordpress Wordpress 2.1
Wordpress Wordpress 2.6
Wordpress Wordpress 2.3.1
Wordpress Wordpress 2.2.0
Wordpress Wordpress 2.2
Wordpress Wordpress 2.0.9
Wordpress Wordpress 2.0.8
Wordpress Wordpress 2.0.11
Wordpress Wordpress 2.0.10 Rc2
Wordpress Wordpress 1.5.1.3
Wordpress Wordpress 1.5.1.2
Wordpress Wordpress 1.2.2
Wordpress Wordpress 1.2.1
Wordpress Wordpress 2.5.1
Wordpress Wordpress 2.5
Wordpress Wordpress 2.3
Wordpress Wordpress 2.2 Revision5003
1 EDB exploit
NA
CVE-2008-1117
Directory traversal vulnerability in the Notes (aka Flash Notes or instant messages) feature in tb2ftp.dll in Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, allows remote malicious users to upload files to arbitrary locations via a destination filename with a \ (b...
Netopia Timbuktu Pro 8.6.5
3 EDB exploits
NA
CVE-2008-0984
The MP4 demuxer (mp4.c) for VLC media player 0.8.6d and previous versions, as used in Miro Player 1.1 and previous versions, allows remote malicious users to overwrite arbitrary memory and execute arbitrary code via a malformed MP4 file.
Miro Miro Player
Videolan Vlc Media Player
1 EDB exploit
NA
CVE-2011-1865
Multiple stack-based buffer overflows in the inet service in HP OpenView Storage Data Protector 6.00 up to and including 6.20 allow remote malicious users to execute arbitrary code via a request containing crafted parameters.
Hp Openview Storage Data Protector 6.10
Hp Openview Storage Data Protector 6.11
Hp Openview Storage Data Protector 6.00
Hp Openview Storage Data Protector 6.20
4 EDB exploits
NA
CVE-2016-58473
Core Security Technologies Advisory - SAP CAR archive tool suffers from security bypass and denial of service vulnerabilities.
NA
CVE-2013-16053
Core Security Technologies Advisory - MayGion IP cameras suffer from path traversal and buffer overflow vulnerabilities.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »