Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple apple remote desktop vulnerabilities and exploits
(subscribe to this query)
356
VMScore
CVE-2010-1637
The Mail Fetch plugin in SquirrelMail 1.4.20 and previous versions allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.
Squirrelmail Squirrelmail
Fedoraproject Fedora 11
Fedoraproject Fedora 13
Fedoraproject Fedora 12
Apple Mac Os X Server
Apple Mac Os X
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
1 Github repository
828
VMScore
CVE-2010-1770
WebKit in Apple Safari prior to 5.0 on Mac OS X 10.5 up to and including 10.6 and Windows, Apple Safari prior to 4.1 on Mac OS X 10.4, and Google Chrome prior to 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows r...
Apple Safari
Apple Webkit
Google Chrome
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.04.4
Canonical Ubuntu Linux 10.10
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Suse Linux Enterprise Desktop 10
Suse Suse Linux Enterprise Desktop 11
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Server 11
605
VMScore
CVE-2020-15969
Use after free in WebRTC in Google Chrome before 86.0.4240.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
Apple Ipados
Apple Safari
Apple Watchos
Apple Macos
Apple Tvos
Apple Iphone Os
445
VMScore
CVE-2004-0886
Multiple integer overflows in libtiff 3.6.1 and previous versions allow remote malicious users to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.4
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.5
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 3.0
668
VMScore
CVE-2004-0803
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and previous versions, related to buffer overflows and integer overflows, allow remote malicious users to execute arbitrary code via TIFF files.
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.6
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.6
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
668
VMScore
CVE-2011-2821
Double free vulnerability in libxml2, as used in Google Chrome prior to 13.0.782.215, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.
Google Chrome
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Eus 6.3
Apple Iphone Os
Apple Mac Os X
383
VMScore
CVE-2010-0302
Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS prior to 1.4.4, when kqueue or epoll is used, allows remote malicious users to cause a denial of service (daemon c...
Apple Mac Os X Server
Apple Mac Os X
Apple Cups
Fedoraproject Fedora 11
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.4
187
VMScore
CVE-2021-30813
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.0.1. A person with access to a host Mac may be able to bypass the Login Window in Remote Desktop for a locked instance of macOS.
Apple Macos
668
VMScore
CVE-2010-4494
Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome prior to 8.0.552.215 and other products, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
Google Chrome
Xmlsoft Libxml2
Apple Itunes
Apple Safari
Apple Iphone Os
Apple Mac Os X
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Suse Linux Enterprise Server 11
Fedoraproject Fedora 14
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Eus 6.3
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Hp Insight Control Server Deployment
Hp Rapid Deployment Pack
Apache Openoffice
605
VMScore
CVE-2011-2834
Double free vulnerability in libxml2, as used in Google Chrome prior to 14.0.835.163, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
Google Chrome
Apple Iphone Os
Apple Mac Os X
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Eus 6.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »