Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
core security technologies vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-35773
Core Security Technologies Advisory - Autodesk 3DS Max Application Callbacks suffers from an arbitrary command execution vulnerability.
NA
CVE-2009-35783
Core Security Technologies Advisory - Autodesk Maya Script Nodes suffers from an arbitrary command execution vulnerability.
NA
CVE-2009-38503
Core Security Technologies Advisory - Blender embeds a python interpreter to extend its functionality. Blender .blend project files can be modified to execute arbitrary commands without user intervention by design. An attacker can take full control of the machine where Blender is...
NA
CVE-2011-06153
Core Security Technologies Advisory - Adobe Audition is vulnerable to numerous buffer overflows while parsing several fields inside the TRKM chunk on session (.ses) files. Then, a memory corruption can be leveraged to execute arbitrary code on vulnerable systems by enticing users...
NA
CVE-2008-1000
Directory traversal vulnerability in ContentServer.py in the Wiki Server in Apple Mac OS X 10.5.2 (aka Leopard) allows remote authenticated users to write arbitrary files via ".." sequences in file attachments.
Apple Mac Os X 10.5.2
Apple Mac Os X Server 10.5.2
1 EDB exploit
NA
CVE-2010-3267
Multiple SQL injection vulnerabilities in BugTracker.NET prior to 3.4.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the qu_id parameter to bugs.aspx, (2) the row_id parameter to delete_query.aspx, the (3) new_project or (4) us_id parameter to edit_b...
Ifdefined Bugtracker.net 3.1.4
Ifdefined Bugtracker.net 3.1.3
Ifdefined Bugtracker.net 3.4.0
Ifdefined Bugtracker.net 3.3.9
Ifdefined Bugtracker.net 2.9.7
Ifdefined Bugtracker.net 3.0.3
Ifdefined Bugtracker.net 3.0.4
Ifdefined Bugtracker.net 3.1.1
Ifdefined Bugtracker.net 3.1.2
Ifdefined Bugtracker.net 2.8.9
Ifdefined Bugtracker.net 2.9.1
Ifdefined Bugtracker.net 2.7.4
Ifdefined Bugtracker.net 2.7.5
Ifdefined Bugtracker.net 2.7.6
Ifdefined Bugtracker.net 2.8.3
Ifdefined Bugtracker.net 2.8.4
Ifdefined Bugtracker.net 2.6.0
Ifdefined Bugtracker.net 2.5.9
Ifdefined Bugtracker.net 2.6.7
Ifdefined Bugtracker.net 2.6.2
Ifdefined Bugtracker.net 2.4.1
Ifdefined Bugtracker.net 2.5.1
1 EDB exploit
NA
CVE-2007-5268
pngrtran.c in libpng prior to 1.0.29 and 1.2.x prior to 1.2.21 use (1) logical instead of bitwise operations and (2) incorrect comparisons, which might allow remote malicious users to cause a denial of service (crash) via a crafted PNG image.
Libpng Libpng
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 7.04
NA
CVE-2010-1929
Multiple stack-based buffer overflows in the jclient._Java_novell_jclient_JClient_defineClass@20 function in jclient.dll in the Tomcat web server in Novell iManager 2.7, 2.7.3, and 2.7.3 FTF2 allow remote authenticated users to execute arbitrary code via the (1) EnteredClassID or...
Novell Imanager 2.7.3
Novell Imanager 2.7.0
1 EDB exploit
NA
CVE-2010-1930
Off-by-one error in Novell iManager 2.7, 2.7.3, and 2.7.3 FTF2 allows remote malicious users to cause a denial of service (daemon crash) via a long tree parameter in a login request to nps/servlet/webacc.
Novell Imanager 2.7.0
Novell Imanager 2.7.3
1 EDB exploit
NA
CVE-2010-2892
gsb/drivers.php in LANDesk Management Gateway 4.0 up to and including 4.0-1.48 and 4.2 up to and including 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request fo...
Landesk Management Gateway 4.0-1.48
Landesk Management Gateway 4.0
Landesk Management Gateway 4.2-1.8
Landesk Management Gateway 4.2
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »