Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
exceed vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2017-20005
NGINX prior to 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.
F5 Nginx
Debian Debian Linux 9.0
445
VMScore
CVE-2005-0637
The copy functions in locore.s such as copyout in OpenBSD 3.5 and 3.6, and possibly other BSD based operating systems, may allow malicious users to exceed certain address boundaries and modify kernel memory.
Openbsd Openbsd 3.6
Openbsd Openbsd 3.5
668
VMScore
CVE-2018-12547
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user co...
Eclipse Openj9
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Satellite 5.8
445
VMScore
CVE-2007-4242
The pop3 Proxy in Astaro Security Gateway (ASG) 7 does not perform virus scanning of attachments that exceed the maximum attachment size, and passes these attachments, which allows remote malicious users to bypass this scanning via a large attachment.
Astaro Security Gateway 7.0
829
VMScore
CVE-2019-19814
In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.
Linux Linux Kernel 5.0.21
445
VMScore
CVE-2011-4022
The sensor in Cisco Intrusion Prevention System (IPS) 7.0 and 7.1 allows remote malicious users to cause a denial of service (file-handle exhaustion and mainApp hang) by making authentication attempts that exceed the configured limit, aka Bug ID CSCto51204.
Cisco Intrusion Prevention System 7.1
Cisco Intrusion Prevention System 7.0
NA
CVE-2023-33864
StreamReader::ReadFromExternal in RenderDoc prior to 1.27 allows an Integer Overflow with a resultant Buffer Overflow. It uses uint32_t(m_BufferSize-m_InputSize) even though m_InputSize can exceed m_BufferSize.
Renderdoc Renderdoc
578
VMScore
CVE-2021-43304
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t...
Yandex Clickhouse
Debian Debian Linux 10.0
1 Github repository
445
VMScore
CVE-2000-1254
crypto/rsa/rsa_gen.c in OpenSSL prior to 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote malicious users to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX pla...
Openssl Openssl
668
VMScore
CVE-1999-1324
VAXstations running Open VMS 5.3 up to and including 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for malicious users to conduct brute force password gu...
Hp Openvms Vax
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »