Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
yu yang vulnerabilities and exploits
(subscribe to this query)
384
VMScore
CVE-2018-6142
Array bounds check failure in V8 in Google Chrome before 67.0.3396.62 allowed a remote malicious user to perform an out of bounds memory read via a crafted PDF file.
Google Chrome
383
VMScore
CVE-2018-6145
Insufficient data validation in HTML parser in Google Chrome before 67.0.3396.62 allowed a remote malicious user to bypass same origin policy via a crafted HTML page.
Google Chrome
605
VMScore
CVE-2018-6118
A double-eviction in the Incognito mode cache that lead to a user-after-free in cache in Google Chrome before 66.0.3359.139 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.
Google Chrome
383
VMScore
CVE-2018-6148
Incorrect implementation in Content Security Policy in Google Chrome before 67.0.3396.79 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
605
VMScore
CVE-2018-6149
Type confusion in JavaScript in Google Chrome before 67.0.3396.87 allowed a remote malicious user to perform an out of bounds memory write via a crafted HTML page.
Google Chrome
515
VMScore
CVE-2004-1150
Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 up to and including 5.08c allows malicious users to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.
Nullsoft Winamp 5.05
Nullsoft Winamp 5.02
Nullsoft Winamp 5.01
Nullsoft Winamp 5.04
Nullsoft Winamp 5.06
Nullsoft Winamp 5.07
Nullsoft Winamp 5.03
Nullsoft Winamp 5.0
Nullsoft Winamp 5.08c
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2