Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
project 2016 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2016-8700
Heap-based buffer overflow in the bm_readbody_bmp function in bitmap_io.c in potrace prior to 1.13 allows remote malicious users to have unspecified impact via a crafted BMP image, a different vulnerability than CVE-2016-8698, CVE-2016-8699, CVE-2016-8701, CVE-2016-8702, and CVE-...
Potrace Project Potrace
6.8
CVSSv2
CVE-2016-8701
Heap-based buffer overflow in the bm_readbody_bmp function in bitmap_io.c in potrace prior to 1.13 allows remote malicious users to have unspecified impact via a crafted BMP image, a different vulnerability than CVE-2016-8698, CVE-2016-8699, CVE-2016-8700, CVE-2016-8702, and CVE-...
Potrace Project Potrace
6.8
CVSSv2
CVE-2016-8702
Heap-based buffer overflow in the bm_readbody_bmp function in bitmap_io.c in potrace prior to 1.13 allows remote malicious users to have unspecified impact via a crafted BMP image, a different vulnerability than CVE-2016-8698, CVE-2016-8699, CVE-2016-8700, CVE-2016-8701, and CVE-...
Potrace Project Potrace
6.8
CVSSv2
CVE-2016-8703
Heap-based buffer overflow in the bm_readbody_bmp function in bitmap_io.c in potrace prior to 1.13 allows remote malicious users to have unspecified impact via a crafted BMP image, a different vulnerability than CVE-2016-8698, CVE-2016-8699, CVE-2016-8700, CVE-2016-8701, and CVE-...
Potrace Project Potrace
4.3
CVSSv2
CVE-2016-8885
The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer prior to 1.900.9 allows remote malicious users to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.
Jasper Project Jasper
9.3
CVSSv2
CVE-2016-10631
jvminstall is a module for downloading and unpacking jvm to local system. jvminstall downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker con...
Jvminstall Project Jvminstall
9.3
CVSSv2
CVE-2016-10642
cmake installs the cmake x86 linux binaries. cmake downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is ...
Cmake Project Cmake -
9.3
CVSSv2
CVE-2016-10643
jstestdriver is a wrapper for Google's jstestdriver. jstestdriver downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary...
Jstestdriver Project Jstestdriver -
9.3
CVSSv2
CVE-2016-10646
resourcehacker is a Node wrapper of Resource Hacker (windows executable resource editor). resourcehacker downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary ...
Resourcehacker Project Resourcehacker -
9.3
CVSSv2
CVE-2016-10664
mystem is a Node.js wrapper for MyStem morphology text analyzer by Yandex.ru mystem downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker cont...
Mystem Project Mystem -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »