Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
daniel a. vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2755
layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote malicious users to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document...
Mozilla Firefox 3.6.7
NA
CVE-2009-0366
The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote malicious users to cause a denial of service via a large compressed WML document.
Wesnoth Wesnoth 1.1.11
Wesnoth Wesnoth 1.0
Wesnoth Wesnoth 1.5.6
Wesnoth Wesnoth 1.4.6
Wesnoth Wesnoth 1.1.8
Wesnoth Wesnoth 1.2.4
Wesnoth Wesnoth 1.5.4
Wesnoth Wesnoth 1.5.10
Wesnoth Wesnoth 1.1
Wesnoth Wesnoth 1.2.2
Wesnoth Wesnoth 1.4.5
Wesnoth Wesnoth 1.5.3
Wesnoth Wesnoth 1.4.1
Wesnoth Wesnoth 1.1.3
Wesnoth Wesnoth 1.3.10
Wesnoth Wesnoth 1.2.7
Wesnoth Wesnoth 1.3.17
Wesnoth Wesnoth 1.3.16
Wesnoth Wesnoth 1.5.7
Wesnoth Wesnoth 1.1.14
Wesnoth Wesnoth 1.2.1
Wesnoth Wesnoth 1.1.6
5.4
CVSSv3
CVE-2019-3886
An incorrect permissions check exists in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.
Redhat Libvirt
Opensuse Leap 42.3
Fedoraproject Fedora 29
Fedoraproject Fedora 30
5.9
CVSSv3
CVE-2017-9526
In Libgcrypt prior to 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that con...
Gnupg Libgcrypt
NA
CVE-2006-5868
Multiple buffer overflows in Imagemagick 6.0 prior to 6.0.6.2, and 6.2 prior to 6.2.4.5, has unknown impact and user-assisted attack vectors via a crafted SGI image.
Imagemagick Imagemagick
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 5.10
NA
CVE-2010-3711
libpurple in Pidgin prior to 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins...
Pidgin Pidgin 2.5.9
Pidgin Pidgin 2.5.8
Pidgin Pidgin
Pidgin Pidgin 2.7.0
Pidgin Pidgin 2.1.0
Pidgin Pidgin 2.6.0
Pidgin Pidgin 2.5.2
Pidgin Pidgin 2.5.1
Pidgin Pidgin 2.5.6
Pidgin Pidgin 2.5.7
Pidgin Pidgin 2.0.1
Pidgin Pidgin 2.4.2
Pidgin Pidgin 2.5.4
Pidgin Pidgin 2.5.5
Pidgin Pidgin 2.6.5
Pidgin Pidgin 2.2.2
Pidgin Pidgin 2.1.1
Pidgin Pidgin 2.3.1
Pidgin Pidgin 2.4.3
Pidgin Pidgin 2.6.6
Pidgin Pidgin 2.0.0
Pidgin Pidgin 2.0.2
5.5
CVSSv3
CVE-2015-1607
kbx/keybox-search.c in GnuPG prior to 1.4.19, 2.0.x prior to 2.0.27, and 2.1.x prior to 2.1.2 does not properly handle bitwise left-shifts, which allows remote malicious users to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extens...
Gnupg Gnupg
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
7.5
CVSSv3
CVE-2017-0379
Libgcrypt prior to 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for malicious users to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
Gnupg Libgcrypt
Debian Debian Linux 9.0
NA
CVE-2009-0367
The Python AI module in Wesnoth 1.4.x and 1.5 prior to 1.5.11 allows remote malicious users to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the ...
Wesnoth Wesnoth 1.5.6
Wesnoth Wesnoth 1.4.6
Wesnoth Wesnoth 1.5.4
Wesnoth Wesnoth 1.5.10
Wesnoth Wesnoth 1.4.5
Wesnoth Wesnoth 1.5.3
Wesnoth Wesnoth 1.4.1
Wesnoth Wesnoth 1.5.7
Wesnoth Wesnoth 1.5.8
Wesnoth Wesnoth 1.5.9
Wesnoth Wesnoth 1.5.0
Wesnoth Wesnoth 1.5.5
Wesnoth Wesnoth 1.4
Wesnoth Wesnoth 1.5.1
Wesnoth Wesnoth 1.4.3
Wesnoth Wesnoth 1.4.2
Wesnoth Wesnoth 1.4.4
Wesnoth Wesnoth 1.4.7
Wesnoth Wesnoth 1.5.2
1 EDB exploit
NA
CVE-2006-4144
Integer overflow in the ReadSGIImage function in sgi.c in ImageMagick prior to 6.2.9 allows user-assisted malicious users to cause a denial of service (crash) and possibly execute arbitrary code via large (1) bytes_per_pixel, (2) columns, and (3) rows values, which trigger a heap...
Imagemagick Imagemagick 6.1.7
Imagemagick Imagemagick 6.0.2
Imagemagick Imagemagick 6.0.8
Imagemagick Imagemagick 6.1.8
Imagemagick Imagemagick 6.1
Imagemagick Imagemagick 6.0.3
Imagemagick Imagemagick 6.2.5
Imagemagick Imagemagick 6.2
Imagemagick Imagemagick 6.0.7
Imagemagick Imagemagick 6.0.1
Imagemagick Imagemagick 6.1.4
Imagemagick Imagemagick 6.1.2
Imagemagick Imagemagick 6.2.6
Imagemagick Imagemagick 6.0.2.5
Imagemagick Imagemagick 6.2.4.5
Imagemagick Imagemagick 6.2.7
Imagemagick Imagemagick 6.0.4
Imagemagick Imagemagick 6.1.6
Imagemagick Imagemagick 6.2.8
Imagemagick Imagemagick 6.0.5
Imagemagick Imagemagick 6.1.3
Imagemagick Imagemagick 6.2.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »