Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
will drewry vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-4766
Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library prior to 7.3 allow context-dependent malicious users to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
Pcre Pcre
NA
CVE-2007-4767
Perl-Compatible Regular Expression (PCRE) library prior to 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent malicious users to cause a denial of service (infinite loop or crash) or execute ar...
Pcre Pcre
NA
CVE-2007-4768
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library prior to 7.3 allows context-dependent malicious users to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
Pcre Pcre
NA
CVE-2007-1661
Perl-Compatible Regular Expression (PCRE) library prior to 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent malicious users to obtain sensitive information or cause a denial of service (crash), ...
Pcre Perl-compatible Regular Expression Library 7.0
Pcre Perl-compatible Regular Expression Library
Pcre Perl-compatible Regular Expression Library 7.1
Apple Mac Os X Server 10.4.11
Apple Mac Os X 10.4.11
NA
CVE-2007-1662
Perl-Compatible Regular Expression (PCRE) library prior to 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent malicious users to cause a denial of service (crash), possibly involving forward references.
Pcre Pcre
NA
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango prior to 1.24 allows context-dependent malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-bas...
Pango Pango 1.6
Pango Pango 1.14
Pango Pango 1.16
Pango Pango 1.8
Pango Pango 1.4
Pango Pango
Pango Pango 1.10
Pango Pango 1.2
Pango Pango 1.18
Pango Pango 1.12
Pango Pango 1.20
3 Github repositories
NA
CVE-2007-1659
Perl-Compatible Regular Expression (PCRE) library prior to 7.3 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
Pcre Pcre
NA
CVE-2007-1660
Perl-Compatible Regular Expression (PCRE) library prior to 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent malicious users to cause a denial of service (crash) and ...
Pcre Pcre
NA
CVE-2006-2937
OpenSSL 0.9.7 prior to 0.9.7l and 0.9.8 prior to 0.9.8d allows remote malicious users to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.
Openssl Openssl 0.9.7a
Openssl Openssl 0.9.7b
Openssl Openssl 0.9.7i
Openssl Openssl 0.9.7j
Openssl Openssl 0.9.7k
Openssl Openssl 0.9.7e
Openssl Openssl 0.9.7f
Openssl Openssl 0.9.8b
Openssl Openssl 0.9.8c
Openssl Openssl 0.9.7c
Openssl Openssl 0.9.7d
Openssl Openssl 0.9.8
Openssl Openssl 0.9.8a
Openssl Openssl 0.9.7
Openssl Openssl 0.9.7g
Openssl Openssl 0.9.7h
NA
CVE-2007-2488
The IAX2 channel driver (chan_iax2) in Asterisk prior to 20070504 does not properly null terminate data, which allows remote malicious users to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application ...
Asterisk Asterisk
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »