Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
abysssec vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-1681
Buffer overflow in VISIODWG.DLL prior to 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote malicious users to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
Microsoft Visio 2007
Microsoft Visio 2002
Microsoft Visio 2003
2 EDB exploits
NA
CVE-2010-2703
Stack-based buffer overflow in the execvp_nc function in the ov.dll module in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53, when running on Windows, allows remote malicious users to execute arbitrary code via a long HTTP request to webappmon.exe.
Hp Openview Network Node Manager 7.51
Hp Openview Network Node Manager 7.53
2 EDB exploits
NA
CVE-2010-0838
Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from t...
Sun Jre
Sun Jre 1.6.0
Sun Jdk 1.6.0
Sun Jdk
Sun Jdk 1.5.0
Sun Jre 1.5.0
1 EDB exploit
NA
CVE-2010-1527
Stack-based buffer overflow in Novell iPrint Client prior to 5.44 allows remote malicious users to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action.
Novell Iprint 4.34
Novell Iprint 4.36
Novell Iprint 5.40
Novell Iprint
Novell Iprint 4.26
Novell Iprint 4.38
Novell Iprint 5.04
Novell Iprint 4.27
Novell Iprint 4.28
Novell Iprint 5.30
Novell Iprint 5.32
Novell Iprint 4.30
Novell Iprint 4.32
Novell Iprint 5.20b
Novell Iprint 5.12
2 EDB exploits
NA
CVE-2010-0822
Stack-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote malicious users to execute arbitrary code via an Excel file with a crafted OBJ (0x5D) record, aka "Excel Object ...
Microsoft Excel 2002
Microsoft Office 2004
Microsoft Office 2008
Microsoft Open Xml File Format Converter
3 EDB exploits
NA
CVE-2010-0480
Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote malicious users to execute arbitrary code via a crafted AVI file, aka "M...
Microsoft Windows 2000
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
Microsoft Windows 2003 Server
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Vista -
3 EDB exploits
1 Article
NA
CVE-2010-2752
Integer overflow in an array class in Mozilla Firefox 3.5.x prior to 3.5.11 and 3.6.x prior to 3.6.7, Thunderbird 3.0.x prior to 3.0.6 and 3.1.x prior to 3.1.1, and SeaMonkey prior to 2.0.6 allows remote malicious users to execute arbitrary code by placing many Cascading Style Sh...
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.5
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.6
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.3
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.3
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.10
Mozilla Firefox 3.6.1
Mozilla Thunderbird 3.1
Mozilla Thunderbird 3.0
Mozilla Thunderbird 3.0.1
Mozilla Thunderbird 3.0.4
Mozilla Thunderbird 3.0.5
Mozilla Thunderbird 3.0.2
Mozilla Thunderbird 3.0.3
Mozilla Seamonkey 1.0.5
1 EDB exploit
NA
CVE-2010-1297
Adobe Flash Player prior to 9.0.277.0 and 10.x prior to 10.1.53.64; Adobe AIR prior to 2.0.2.12610; and Adobe Reader and Acrobat 9.x prior to 9.3.3, and 8.x prior to 8.2.3 on Windows and Mac OS X, allow remote malicious users to execute arbitrary code or cause a denial of service...
Adobe Flash Player 9.0.125.0
Adobe Flash Player 9.0.151.0
Adobe Flash Player 9.0.246.0
Adobe Flash Player 9.0.260.0
Adobe Flash Player 9.0.28
Adobe Flash Player
Adobe Flash Player 9.0.152.0
Adobe Flash Player 9.0.159.0
Adobe Flash Player 9.0.28.0
Adobe Flash Player 9.0.31
Adobe Flash Player 9.0.115.0
Adobe Flash Player 9.0.124.0
Adobe Flash Player 9.0.20
Adobe Flash Player 9.0.20.0
Adobe Flash Player 9.0.47.0
Adobe Flash Player 9.0.48.0
Adobe Flash Player 9.0.112.0
Adobe Flash Player 9.0.114.0
Adobe Flash Player 9.0.16
Adobe Flash Player 9.0.18d60
Adobe Flash Player 9.0.31.0
Adobe Flash Player 9.0.45.0
4 EDB exploits
1 Article
NA
CVE-2010-1214
Integer overflow in Mozilla Firefox 3.5.x prior to 3.5.11 and 3.6.x prior to 3.6.7, and SeaMonkey prior to 2.0.6, allows remote malicious users to execute arbitrary code via plugin content with many parameter elements.
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.4
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.3
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.6
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.6
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.10
Mozilla Firefox 3.6.1
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.0.4
Mozilla Seamonkey 1.1.1
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0
Mozilla Seamonkey 1.1.16
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 1.1.6
2 EDB exploits
NA
CVE-2010-1199
Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, Thunderbird prior to 3.0.5, and SeaMonkey prior to 2.0.5 allows remote malicious users to execute arbitrary code via a large text value for a node.
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.3
Mozilla Seamonkey 2.0
Mozilla Seamonkey 1.1.18
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.1.9
Mozilla Seamonkey 1.1.1
Mozilla Seamonkey 1.1
Mozilla Seamonkey 1.0.5
Mozilla Seamonkey 1.0.4
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 2.0.1
Mozilla Seamonkey 1.1.19
Mozilla Seamonkey 1.1.12
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »