Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
iso stack vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2007-0097
Multiple stack-based buffer overflows in the (1) LoadTree and (2) ReadHeader functions in PAISO.DLL 1.7.3.0 (1.7.3 beta) in ConeXware PowerArchiver 2006 9.64.02 allow user-assisted malicious users to execute arbitrary code via a crafted ISO file containing a file within several n...
Conexware Powerarchiver 2006 9.64.02
6.8
CVSSv2
CVE-2015-8836
Integer overflow in the isofs_real_read_zf function in isofs.c in FuseISO 20070708 might allow remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a large ZF block size in an ISO file, leading to a heap-based buffe...
Fedoraproject Fedora 16
Fedoraproject Fedora 17
Fuseiso Project Fuseiso
7.5
CVSSv2
CVE-2015-2320
The TLS stack in Mono prior to 3.12.1 allows remote malicious users to have unspecified impact via vectors related to client-side SSLv2 fallback.
Mono-project Mono
Debian Debian Linux 7.0
6.8
CVSSv2
CVE-2015-2318
The TLS stack in Mono prior to 3.12.1 allows man-in-the-middle malicious users to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.
Mono-project Mono
Debian Debian Linux 6.0
5
CVSSv2
CVE-2015-2319
The TLS stack in Mono prior to 3.12.1 makes it easier for remote malicious users to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
Mono-project Mono
2.1
CVSSv2
CVE-2005-3044
Multiple vulnerabilities in Linux kernel prior to 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
5.8
CVSSv2
CVE-2015-8140
The ntpq protocol in NTP prior to 4.2.8p7 allows remote malicious users to conduct replay attacks by sniffing the network.
Ntp Ntp
5
CVSSv2
CVE-2015-8139
ntpq in NTP prior to 4.2.8p7 allows remote malicious users to obtain origin timestamps and then impersonate peers via unspecified vectors.
Ntp Ntp
5.8
CVSSv2
CVE-2015-7973
NTP prior to 4.2.8p6 and 4.3.x prior to 4.3.90, when configured in broadcast mode, allows man-in-the-middle malicious users to conduct replay attacks by sniffing the network.
Ntp Ntp
Ntp Ntp 4.2.8
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
Freebsd Freebsd 9.3
Freebsd Freebsd
Freebsd Freebsd 10.1
Freebsd Freebsd 10.2
Netapp Clustered Data Ontap -
Netapp Oncommand Balance -
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
6.2
CVSSv2
CVE-2013-1826
The xfrm_state_netlink function in net/xfrm/xfrm_user.c in the Linux kernel prior to 3.5.7 does not properly handle error conditions in dump_one_state function calls, which allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system cra...
Linux Linux Kernel 3.5.2
Linux Linux Kernel
Linux Linux Kernel 3.5.5
Linux Linux Kernel 3.5.3
Linux Linux Kernel 3.5.4
Linux Linux Kernel 3.5.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »