Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
developer tools vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-36720
Windows Mixed Reality Developer Tools Denial of Service Vulnerability
Microsoft Windows Server 2016 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2022 -
Microsoft Windows 10 22h2
Microsoft Windows 10 1809
Microsoft Windows 10 21h2
Microsoft Windows 11 21h2
Microsoft Windows 11 22h2
Microsoft Windows 10 1607
4.4
CVSSv2
CVE-2021-3695
A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be expl...
Gnu Grub2
Fedoraproject Fedora 36
Redhat Openshift 3.0
Redhat Enterprise Linux 8.0
Redhat Developer Tools 1.0
Redhat Enterprise Linux 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux For Power Little Endian Eus 8.2
Redhat Enterprise Linux For Power Little Endian 8.0
Redhat Enterprise Linux For Power Little Endian Eus 8.4
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.1
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.2
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.4
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.6
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
6.9
CVSSv2
CVE-2021-3696
A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding...
Gnu Grub2
Redhat Openshift 3.0
Redhat Enterprise Linux 8.0
Redhat Developer Tools 1.0
Redhat Enterprise Linux 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux For Power Little Endian Eus 8.2
Redhat Enterprise Linux For Power Little Endian 8.0
Redhat Enterprise Linux For Power Little Endian Eus 8.4
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.1
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.2
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.4
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.6
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
Redhat Enterprise Linux For Power Little Endian Eus 8.6
9.3
CVSSv2
CVE-2010-0811
Multiple unspecified vulnerabilities in the Microsoft Internet Explorer 8 Developer Tools ActiveX control in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold a...
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows 2003 Server
Microsoft Windows Vista -
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7 -
Microsoft Windows Server 2008 R2
9.3
CVSSv2
CVE-2010-1502
Unspecified vulnerability in Google Chrome prior to 4.1.249.1059 allows remote malicious users to access local files via vectors related to "developer tools."
Google Chrome 4.1.249.1008
Google Chrome 4.1.249.1007
Google Chrome 4.1.249.1027
Google Chrome 4.1.249.1028
Google Chrome 4.1.249.1020
Google Chrome 4.1.249.1021
Google Chrome 4.1.249.1034
Google Chrome 4.1.249.1031
Google Chrome 4.1.249.1047
Google Chrome 4.1.249.1048
Google Chrome 4.1.249.1049
Google Chrome 4.1.249.1056
Google Chrome 4.1.249.1057
Google Chrome 4.0.302.2
Google Chrome 4.0.302.1
Google Chrome 4.0.292.0
Google Chrome 4.1.249.1012
Google Chrome 4.1.249.1011
Google Chrome 4.1.249.1001
Google Chrome 4.1.249.0
Google Chrome 4.1.249.1024
Google Chrome 4.1.249.1025
10
CVSSv2
CVE-2015-4032
projectContents.jsp in the Developer tools in Visual Mining NetCharts Server allows remote malicious users to rename arbitrary files, and consequently execute them, via unspecified vectors.
Visual Mining Netcharts Server -
5
CVSSv2
CVE-2013-2855
The Developer Tools API in Google Chrome prior to 27.0.1453.110 allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Google Chrome 27.0.1453.107
Google Chrome
Google Chrome 27.0.1453.77
Google Chrome 27.0.1453.105
Google Chrome 27.0.1453.74
Google Chrome 27.0.1453.61
Google Chrome 27.0.1453.62
Google Chrome 27.0.1453.34
Google Chrome 27.0.1453.11
Google Chrome 27.0.1453.47
Google Chrome 27.0.1453.81
Google Chrome 27.0.1453.102
Google Chrome 27.0.1453.54
Google Chrome 27.0.1453.41
Google Chrome 27.0.1453.10
Google Chrome 27.0.1453.42
Google Chrome 27.0.1453.59
Google Chrome 27.0.1453.7
Google Chrome 27.0.1453.93
Google Chrome 27.0.1453.70
Google Chrome 27.0.1453.69
Google Chrome 27.0.1453.51
NA
CVE-2023-48795
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH prior to 9.6 and other products, allows remote malicious users to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may conseque...
Openbsd Openssh
Putty Putty
Filezilla-project Filezilla Client
Microsoft Powershell
Panic Transmit 5
Panic Nova
Roumenpetrov Pkixssh
Winscp Winscp
Bitvise Ssh Client
Bitvise Ssh Server
Lancom-systems Lcos
Lancom-systems Lcos Fx -
Lancom-systems Lcos Lx -
Lancom-systems Lcos Sx 5.20
Lancom-systems Lcos Sx 4.20
Lancom-systems Lanconfig -
Vandyke Securecrt
Libssh Libssh
Net-ssh Net-ssh 7.2.0
Ssh2 Project Ssh2
Proftpd Proftpd
Freebsd Freebsd
9 Github repositories
1 Article
6.8
CVSSv2
CVE-2011-1816
Use-after-free vulnerability in the developer tools in Google Chrome prior to 12.0.742.91 allows remote malicious users to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Google Chrome
9.3
CVSSv2
CVE-2020-6518
Use after free in developer tools in Google Chrome before 84.0.4147.89 allowed a remote attacker who had convinced the user to use developer tools to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.2
Opensuse Backports Sle 15.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »