Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2010 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2010-0555
Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote malicious users to bypass intended access restrictions and read arbitrary files via vectors involving the product's use of text/...
Microsoft Internet Explorer 6
Microsoft Windows Server 2003
Microsoft Windows Xp
Microsoft Internet Explorer 7
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Vista Gold
Microsoft Internet Explorer 5.01
Microsoft Windows 2000
7.2
CVSSv2
CVE-2010-0232
The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, d...
Microsoft Windows Nt 3.1
Microsoft Windows Server 2008 -
Microsoft Windows Xp -
Microsoft Windows Server 2008 Sp2
Microsoft Windows Vista
Microsoft Windows 7 -
Microsoft Windows Server 2008
Microsoft Windows 2000 Sp4
Microsoft Windows Xp Sp3
Microsoft Windows Server 2003
Microsoft Windows Vista Sp1
Microsoft Windows Vista Sp2
1 EDB exploit
3 Github repositories
9.3
CVSSv2
CVE-2010-0249
Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote malicious users to execute arb...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 8
2 EDB exploits
2 Github repositories
6 Articles
5.8
CVSSv2
CVE-2009-3555
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and previous versions, OpenSSL prior to 0.9.8l, GnuTLS 2.8.5 and previous versions, Mozilla Network Security Ser...
Openssl Openssl 1.0
Apache Http Server
Openssl Openssl
Gnu Gnutls
Mozilla Nss
Debian Debian Linux 5.0
Canonical Ubuntu Linux 10.10
Fedoraproject Fedora 11
Fedoraproject Fedora 13
Debian Debian Linux 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 9.04
Debian Debian Linux 6.0
Fedoraproject Fedora 12
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Fedoraproject Fedora 14
F5 Nginx
2 EDB exploits
10 Github repositories
5
CVSSv2
CVE-2009-0217
The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Pro...
Oracle Application Server 10.1.3.4
Oracle Application Server 10.1.2.3
Oracle Bea Product Suite 10.0
Mono Project Mono 2.0
Oracle Weblogic Server Component 10.3
Oracle Weblogic Server Component 10.0
Ibm Websphere Application Server 6.0.2.10
Ibm Websphere Application Server 6.0.2.12
Ibm Websphere Application Server 6.0.1.1
Ibm Websphere Application Server 6.0.1.13
Ibm Websphere Application Server 6.0.2.2
Ibm Websphere Application Server 6.0.2.19
Ibm Websphere Application Server 6.0.2.21
Ibm Websphere Application Server 6.0.0.2
Ibm Websphere Application Server 6.0.2.29
Ibm Websphere Application Server 6.0.2.28
Ibm Websphere Application Server 6.0.2.25
Ibm Websphere Application Server 6.1.0.20
Ibm Websphere Application Server 6.1.0.22
Ibm Websphere Application Server 6.1.0.13
Ibm Websphere Application Server 6.1.0.14
Ibm Websphere Application Server 6.1.0.3
5.1
CVSSv2
CVE-2006-0003
Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote malicious users to execute arbitrary code via unknown attack vectors.
Microsoft Data Access Components 2.5
Microsoft Data Access Components 2.8
Microsoft Data Access Components 2.7
3 EDB exploits
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10