Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
david may vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-4520
Mozilla Firefox prior to 41.0 and Firefox ESR 38.x prior to 38.3 allow remote malicious users to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
Mozilla Firefox Esr 38.2.1
Mozilla Firefox Esr 38.1.1
Mozilla Firefox Esr 38.2.0
Mozilla Firefox Esr 38.0.5
Mozilla Firefox Esr 38.1.0
Mozilla Firefox Esr 38.0
Mozilla Firefox Esr 38.0.1
Mozilla Firefox
NA
CVE-2014-1585
The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox prior to 33.0, Firefox ESR 31.x prior to 31.2, and Thunderbird 31.x prior to 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote malicious users ...
Mozilla Thunderbird 31.1.0
Mozilla Thunderbird 31.0
Mozilla Firefox Esr 31.1.0
Mozilla Firefox Esr 31.0
Mozilla Firefox 30.0
Mozilla Firefox 31.1.0
Mozilla Firefox 31.0
Mozilla Firefox
NA
CVE-2014-1586
content/base/src/nsDocument.cpp in Mozilla Firefox prior to 33.0, Firefox ESR 31.x prior to 31.2, and Thunderbird 31.x prior to 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote malicious users to obtain sensitive information from the local cam...
Mozilla Firefox 30.0
Mozilla Firefox 31.1.0
Mozilla Firefox 31.0
Mozilla Firefox
Mozilla Thunderbird 31.0
Mozilla Thunderbird 31.1.0
Mozilla Firefox Esr 31.1.0
Mozilla Firefox Esr 31.0
NA
CVE-2005-2457
The driver for compressed ISO file systems (zisofs) in the Linux kernel prior to 2.6.12.5 allows local users and remote malicious users to cause a denial of service (kernel crash) via a crafted compressed ISO file system.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.8
NA
CVE-2005-2555
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Debian Debian Linux 3.1
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
NA
CVE-2009-0746
The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 prior to 2.6.27.19 and 2.6.28 prior to 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.27.17
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.27.16
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.27.4
Linux Linux Kernel 2.6.27
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.27.13
Linux Linux Kernel 2.6.27.15
Linux Linux Kernel 2.6.27.8
Linux Linux Kernel 2.6.27.9
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.27.5
Linux Linux Kernel 2.6.27.7
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.27.2
Linux Linux Kernel 2.6.27.11
1 EDB exploit
NA
CVE-2009-0747
The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 prior to 2.6.27.19 and 2.6.28 prior to 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and err...
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.27
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.27.17
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.27.16
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.27.4
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.27.13
Linux Linux Kernel 2.6.27.15
Linux Linux Kernel 2.6.27.8
Linux Linux Kernel 2.6.27.9
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.27.5
Linux Linux Kernel 2.6.27.7
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.27.2
NA
CVE-2009-0748
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 prior to 2.6.27.19 and 2.6.28 prior to 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mo...
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.27
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.27.17
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.27.16
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.27.4
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.27.13
Linux Linux Kernel 2.6.27.15
Linux Linux Kernel 2.6.27.8
Linux Linux Kernel 2.6.27.9
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.27.5
Linux Linux Kernel 2.6.27.7
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.27.2
7.5
CVSSv3
CVE-2020-29363
An issue exists in p11-kit 0.23.6 up to and including 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiv...
P11-kit Project P11-kit
Debian Debian Linux 10.0
Oracle Communications Cloud Native Core Policy 1.14.0
1 Github repository
NA
CVE-2014-0480
The core.urlresolvers.reverse function in Django prior to 1.4.14, 1.5.x prior to 1.5.9, 1.6.x prior to 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote malicious users to conduct phishing attacks via a // (slash slash) in a URL, which...
Opensuse Opensuse 13.1
Opensuse Opensuse 12.3
Djangoproject Django 1.7
Djangoproject Django 1.6
Djangoproject Django 1.6.3
Djangoproject Django 1.6.4
Djangoproject Django 1.6.1
Djangoproject Django 1.6.2
Djangoproject Django 1.6.5
Djangoproject Django 1.5
Djangoproject Django 1.5.6
Djangoproject Django 1.5.7
Djangoproject Django 1.5.2
Djangoproject Django 1.5.3
Djangoproject Django 1.5.1
Djangoproject Django 1.5.8
Djangoproject Django 1.5.4
Djangoproject Django 1.5.5
Djangoproject Django
Djangoproject Django 1.4.2
Djangoproject Django 1.4
Djangoproject Django 1.4.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »