Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tavis ormandy vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2005-1108
The ij_untrusted_url function in JunkBuster 2.0.2-r2, with single-threaded mode enabled, allows remote malicious users to overwrite the referrer field via a crafted HTTP request.
Junkbuster Internet Junkbuster 2.0.2 R2
668
VMScore
CVE-2005-1109
The filtering of URLs in JunkBuster prior to 2.0.2-r3 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via heap corruption.
Junkbuster Internet Junkbuster 2.0.2
Junkbuster Internet Junkbuster 2.0.2 R2
Junkbuster Internet Junkbuster 2.0.1
642
VMScore
CVE-2010-2492
Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel prior to 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors.
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Avaya Aura System Manager 6.0
Avaya Aura System Manager 5.2
Avaya Aura Communication Manager 5.2
Avaya Aura System Platform 1.1
Avaya Aura System Platform 6.0
Avaya Aura System Manager 6.1
Avaya Aura System Manager 6.1.1
Avaya Aura Session Manager 1.1
Avaya Aura Session Manager 5.2
Avaya Aura Session Manager 6.0
Avaya Aura Presence Services 6.1
Avaya Aura Presence Services 6.1.1
Avaya Aura Presence Services 6.0
Avaya Iq 5.1
Avaya Iq 5.0
Avaya Aura Voice Portal 5.0
Avaya Aura Voice Portal 5.1
668
VMScore
CVE-2009-0946
Multiple integer overflows in FreeType 2.3.9 and previous versions allow remote malicious users to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
Freetype Freetype
Debian Debian Linux 4.0
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.04
Opensuse Opensuse 10.3
Opensuse Opensuse 11.0
Opensuse Opensuse 11.1
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Apple Safari 4.0
Apple Iphone Os
Apple Mac Os X 10.4.11
Apple Mac Os X 10.5.8
Apple Mac Os X
Apple Mac Os X Server 10.4.11
Apple Mac Os X Server 10.5.8
Apple Mac Os X Server
606
VMScore
CVE-2016-7976
The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote malicious users to execute arbitrary code via crafted userparams.
Artifex Ghostscript 9.18
Artifex Ghostscript 9.20
3 Github repositories
668
VMScore
CVE-2007-5116
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent malicious users to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Openpkg Openpkg Current
Redhat Enterprise Linux 1.0
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.6
Mandrakesoft Mandrake Multi Network Firewall 2.0
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
685
VMScore
CVE-2009-5022
Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF prior to 3.9.5 allows remote malicious users to execute arbitrary code via a crafted TIFF file.
Libtiff Libtiff 3.4
Libtiff Libtiff 3.7.0
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.8.0
Libtiff Libtiff 3.7.3
Libtiff Libtiff 3.8.1
Libtiff Libtiff 3.9.3
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.8.2
Libtiff Libtiff 3.7.2
Libtiff Libtiff 3.9.2-5.2.1
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.7.1
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.2
Libtiff Libtiff
Libtiff Libtiff 3.9.2
Libtiff Libtiff 3.7.4
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.9.0
Libtiff Libtiff 3.5.6
1 EDB exploit
454
VMScore
CVE-2005-1546
Buffer overflow in the PE parser in HT Editor prior to 0.8.0 allows remote malicious users to execute arbitrary code via a crafted PE file.
Ht Editor Ht Editor 0.4.1
Ht Editor Ht Editor 0.4.2
Ht Editor Ht Editor 0.3.991
Ht Editor Ht Editor 0.4.0
Ht Editor Ht Editor 0.4.4b
Ht Editor Ht Editor 0.4.4d
Ht Editor Ht Editor 0.7.2
Ht Editor Ht Editor 0.7.4
Ht Editor Ht Editor 0.4.3
Ht Editor Ht Editor 0.4.4
Ht Editor Ht Editor 0.7.5
Ht Editor Ht Editor 0.8.0
Ht Editor Ht Editor 2000-01-14
Ht Editor Ht Editor 0.5.0
Ht Editor Ht Editor 0.6.0
Ht Editor Ht Editor 0.6.0b
Ht Editor Ht Editor 0.7.0
Ht Editor Ht Editor 0.3.992
Ht Editor Ht Editor 0.4.4c
Ht Editor Ht Editor 0.4.5
Ht Editor Ht Editor 0.7.1
Ht Editor Ht Editor 0.7.3
465
VMScore
CVE-2006-0455
gpgv in GnuPG prior to 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded....
Gnu Privacy Guard 1.4.2
Gnu Privacy Guard 1.4
Gnu Privacy Guard 1.4.1
Gnu Privacy Guard 1.0.3
Gnu Privacy Guard 1.2.1
Gnu Privacy Guard 1.0.7
Gnu Privacy Guard 1.0.5
Gnu Privacy Guard 1.0.6
Gnu Privacy Guard 1.3.3
Gnu Privacy Guard 1.2.2
Gnu Privacy Guard 1.0
Gnu Privacy Guard 1.0.2
Gnu Privacy Guard 1.2.3
Gnu Privacy Guard 1.2.6
Gnu Privacy Guard 1.2.5
Gnu Privacy Guard 1.0.4
Gnu Privacy Guard 1.3.4
Gnu Privacy Guard 1.0.1
Gnu Privacy Guard 1.0.3b
Gnu Privacy Guard 1.2
Gnu Privacy Guard 1.2.7
Gnu Privacy Guard 1.2.4
1 EDB exploit
730
VMScore
CVE-2009-1894
Race condition in PulseAudio 0.9.9, 0.9.10, and 0.9.14 allows local users to gain privileges via vectors involving creation of a hard link, related to the application setting LD_BIND_NOW to 1, and then calling execv on the target of the /proc/self/exe symlink.
Pulseaudio Pulseaudio 0.9.10
Pulseaudio Pulseaudio 0.9.9
Pulseaudio Pulseaudio 0.9.14
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »