Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google login vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2011-3970
libxslt, as used in Google Chrome prior to 17.0.963.46, allows remote malicious users to cause a denial of service (out-of-bounds read) via unspecified vectors.
Google Chrome
Xmlsoft Libxslt
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 11
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Server 10
5
CVSSv2
CVE-2011-3905
libxml2, as used in Google Chrome prior to 16.0.912.63, allows remote malicious users to cause a denial of service (out-of-bounds read) via unspecified vectors.
Google Chrome
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Eus 6.3
6.8
CVSSv2
CVE-2011-3026
Integer overflow in libpng, as used in Google Chrome prior to 17.0.963.56, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
Google Chrome
Apple Iphone Os
Apple Mac Os X 10.6.8
Apple Mac Os X
Apple Mac Os X Server 10.6.8
Apple Mac Os X Server
Opensuse Opensuse 11.4
Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Server 11
1 Github repository
7.5
CVSSv2
CVE-2011-2821
Double free vulnerability in libxml2, as used in Google Chrome prior to 13.0.782.215, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.
Google Chrome
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Eus 6.3
Apple Iphone Os
Apple Mac Os X
6.8
CVSSv2
CVE-2011-2834
Double free vulnerability in libxml2, as used in Google Chrome prior to 14.0.835.163, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
Google Chrome
Apple Iphone Os
Apple Mac Os X
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Eus 6.3
7.5
CVSSv2
CVE-2011-3919
Heap-based buffer overflow in libxml2, as used in Google Chrome prior to 16.0.912.75, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Google Chrome
Apple Iphone Os
Apple Mac Os X
Suse Linux Enterprise Server 10
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Eus 6.3
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
5.8
CVSSv2
CVE-2021-43777
Redash is a package for data visualization and sharing. In Redash version 10.0 and prior, the implementation of Google Login (via OAuth) incorrectly uses the `state` parameter to pass the next URL to redirect the user to after login. The `state` parameter should be used for a Cro...
Redash Redash
6.8
CVSSv2
CVE-2013-0258
The Google Authenticator login (ga_login) module 7.x prior to 7.x-1.3 for Drupal, when multi-factor authentication is enabled, allows remote malicious users to bypass authentication for accounts without an associated Google Authenticator token by logging in with the username.
Google Authenticator Login Project Ga Login 7.x-1.2
Google Authenticator Login Project Ga Login 7.x-1.0
Google Authenticator Login Project Ga Login 7.x-1.1
4.3
CVSSv2
CVE-2007-5112
Cross-site scripting (XSS) vulnerability in session.cgi (aka the login page) in Google Urchin 5 5.7.03 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the query string, a different vulnerability than CVE-2007-4713. NOTE: this can be ...
Roi Revolution Urchin
1 EDB exploit
5
CVSSv2
CVE-2013-6629
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo up to and including 1.3.0, as used in Google Chrome prior to 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that fol...
Google Chrome
Oracle Solaris 11.3
Artifex Gpl Ghostscript
Libjpeg-turbo Libjpeg-turbo
Fedoraproject Fedora 18
Fedoraproject Fedora 20
Fedoraproject Fedora 19
Opensuse Opensuse 12.3
Opensuse Opensuse 12.2
Opensuse Opensuse 13.1
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Mozilla Firefox
Mozilla Seamonkey
Mozilla Thunderbird
Mozilla Firefox Esr
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »