Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 10.10 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2010-4253
Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x prior to 3.3 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file in an ODF or Microsoft Office document, as demonstrated ...
Apache Openoffice
Debian Debian Linux 5.0
Canonical Ubuntu Linux 10.10
Debian Debian Linux 6.0
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
9.3
CVSSv2
CVE-2011-0480
Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome prior to 8.0.552.237 and Chrome OS prior to 8.0.552.344, allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly have unspec...
Google Chrome Os
Google Chrome
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
9.3
CVSSv2
CVE-2010-2941
ipp.c in cupsd in CUPS 1.4.4 and previous versions does not properly allocate memory for attribute values with invalid string data types, which allows remote malicious users to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via...
Apple Cups
Apple Mac Os X Server
Apple Mac Os X
Fedoraproject Fedora 13
Fedoraproject Fedora 12
Fedoraproject Fedora 14
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 5.0
Opensuse Opensuse 11.1
Suse Linux Enterprise Server 9
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Linux Enterprise 11.0
Suse Linux Enterprise 10.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux 5.0
9.3
CVSSv2
CVE-2010-3257
Use-after-free vulnerability in WebKit, as used in Apple Safari prior to 4.1.3 and 5.0.x prior to 5.0.3, Google Chrome prior to 6.0.472.53, and webkitgtk prior to 1.2.6, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via v...
Google Chrome
Webkitgtk Webkitgtk
Apple Safari
Apple Iphone Os
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.10
9.3
CVSSv2
CVE-2010-2647
Google Chrome prior to 5.0.375.99 allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via an invalid SVG document.
Google Chrome
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.10
9.3
CVSSv2
CVE-2010-2648
The implementation of the Unicode Bidirectional Algorithm (aka Bidi algorithm or UBA) in Google Chrome prior to 5.0.375.99 allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Google Chrome
Opensuse Opensuse 11.3
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.10
9.3
CVSSv2
CVE-2010-1770
WebKit in Apple Safari prior to 5.0 on Mac OS X 10.5 up to and including 10.6 and Windows, Apple Safari prior to 4.1 on Mac OS X 10.4, and Google Chrome prior to 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows r...
Apple Safari
Apple Webkit
Google Chrome
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.04.4
Canonical Ubuntu Linux 10.10
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Suse Linux Enterprise Desktop 10
Suse Suse Linux Enterprise Desktop 11
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Server 11
9.3
CVSSv2
CVE-2010-0050
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via an HTML document with improperly nested tags.
Apple Safari
Apple Iphone Os
Fedoraproject Fedora 11
Fedoraproject Fedora 13
Fedoraproject Fedora 12
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
1 EDB exploit
8.3
CVSSv2
CVE-2010-3705
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel prior to 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote malicious users to cause a denial of service (memory corruption and panic) via a crafted value in the las...
Linux Linux Kernel
Fedoraproject Fedora 13
Debian Debian Linux 5.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 6.06
7.8
CVSSv2
CVE-2011-2189
net/core/net_namespace.c in the Linux kernel 2.6.32 and previous versions does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote malicious users to cause a denial of service (memory consumption) via requests to a daemo...
Linux Linux Kernel
Redhat Enterprise Linux 6.0
Redhat Enterprise Mrg 2.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »