Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sean vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2006-4168
Integer overflow in the exif_data_load_data_entry function in libexif/exif-data.c in Libexif prior to 0.6.16 allows remote malicious users to cause a denial of service (application crash) or execute arbitrary code via an image with many EXIF components, which triggers a heap-base...
Libexif Libexif 0.6.12
Libexif Libexif 0.6.13
Libexif Libexif 0.6.11
Libexif Libexif 0.6.9
Libexif Libexif 0.6.14
Libexif Libexif 0.6.15
6.8
CVSSv2
CVE-2007-2949
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote malicious users to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
Gimp Gimp
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 7.04
NA
CVE-2023-2813
All of the above Aapna WordPress theme up to and including 1.3, Anand WordPress theme up to and including 1.2, Anfaust WordPress theme up to and including 1.1, Arendelle WordPress theme prior to 1.1.13, Atlast Business WordPress theme up to and including 1.5.8.5, Bazaar Lite Word...
Saumendra Aapna
Saumendra Anand
Thewebhunter Anfaust
Deothemes Arendelle
Archimidismertzanos Atlast Business
Themeinprogress Bazaar Lite
Arthousewebdesign Brain Power
Yws Bunnypress Lite
Ayecode Cafe Bistro
Ayecode College
Omarfolgheraiter Digitally
Henleythemes Counterpoint
Ajaydsouza Connections Reloaded
Competethemes Drop
Ayecode Directory
Deothemes Everse
Archimidismertzanos Fashionable Store
Marchettidesign Fullbase
Dotecsa Ilex
Jinwen Js O3 Lite
Climaxthemes Kata
Jinwen Js Paper
9.3
CVSSv2
CVE-2007-4619
Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC prior to 1.2.1, as used in Winamp prior to 5.5 and other products, allow user-assisted remote malicious users to execute arbitrary code via a malformed FLAC file that triggers improper memory allocation, resul...
Flac Libflac
Nullsoft Winamp
NA
CVE-2021-47277
In the Linux kernel, the following vulnerability has been resolved: kvm: avoid speculation-based attacks from out-of-range memslot accesses KVM's mechanism for accessing guest memory translates a guest physical address (gpa) to a host virtual address using the right-shifted ...
7.5
CVSSv2
CVE-2015-4598
PHP prior to 5.4.42, 5.5.x prior to 5.5.26, and 5.6.x prior to 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote malicious users to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2...
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Php Php 5.5.25
Php Php 5.5.24
Php Php 5.6.2
Php Php 5.6.1
Php Php 5.5.18
Php Php 5.6.7
Php Php 5.6.6
Php Php 5.5.22
Php Php 5.5.21
Php Php 5.5.14
Php Php 5.5.13
Php Php 5.5.6
Php Php 5.5.5
Php Php 5.5.4
Php Php 5.6.5
Php Php 5.6.4
NA
CVE-2023-34414
The error page for sites with invalid TLS certificates was missing the activation-delay Firefox uses to protect prompts and permission dialogs from attacks that exploit human response time delays. If a malicious page elicited user clicks in precise locations immediately before na...
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Thunderbird
9.3
CVSSv2
CVE-2007-1667
Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 prior to 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote malicious users to cause a denial of service (crash) or obtain sensitive information via crafted i...
X.org Libx11
Imagemagick Imagemagick
7.2
CVSSv2
CVE-2000-0250
The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.
Qnx Qnx 4.25a
1 EDB exploit
10
CVSSv2
CVE-2004-0989
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote malicious users to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data...
Xmlsoft Libxml 1.8.17
Xmlsoft Libxml2 2.5.11
Xmlsoft Libxml2 2.6.9
Xmlstarlet Command Line Xml Toolkit 0.9.1
Xmlsoft Libxml2 2.6.11
Xmlsoft Libxml2 2.6.12
Xmlsoft Libxml2 2.6.13
Xmlsoft Libxml2 2.6.14
Xmlsoft Libxml2 2.6.6
Xmlsoft Libxml2 2.6.7
Xmlsoft Libxml2 2.6.8
Redhat Fedora Core Core 2.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Ubuntu Ubuntu Linux 4.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »