Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kevin vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2023-2430
A vulnerability was found due to missing lock for IOPOLL flaw in io_cqring_event_overflow() in io_uring.c in Linux Kernel. This flaw allows a local attacker with user privilege to trigger a Denial of Service threat.
Linux Linux Kernel
Linux Linux Kernel 6.2
7.5
CVSSv3
CVE-2011-5326
imlib2 prior to 1.4.9 allows remote malicious users to cause a denial of service (divide-by-zero error and application crash) by drawing a 2x1 ellipse.
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Enlightenment Imlib2
7.5
CVSSv3
CVE-2016-3993
Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 prior to 1.4.9 allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via crafted coordinates.
Enlightenment Imlib2
Debian Debian Linux 7.0
Debian Debian Linux 8.0
9.8
CVSSv3
CVE-2016-4024
Integer overflow in imlib2 prior to 1.4.9 on 32-bit platforms allows remote malicious users to execute arbitrary code via large dimensions in an image, which triggers an out-of-bounds heap memory write operation.
Enlightenment Imlib2
Debian Debian Linux 7.0
Opensuse Opensuse 13.2
Debian Debian Linux 8.0
8.2
CVSSv3
CVE-2016-3994
The GIF loader in imlib2 prior to 1.4.9 allows remote malicious users to cause a denial of service (application crash) or obtain sensitive information via a crafted image, which triggers an out-of-bounds read.
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Enlightenment Imlib2
3.3
CVSSv3
CVE-2019-15790
Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information...
Apport Project Apport -
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
7.5
CVSSv3
CVE-2014-9771
Integer overflow in imlib2 prior to 1.4.7 allows remote malicious users to cause a denial of service (memory consumption or application crash) via a crafted image, which triggers an invalid read operation.
Enlightenment Imlib2
Debian Debian Linux 7.0
Debian Debian Linux 8.0
7
CVSSv3
CVE-2023-1989
A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.
Linux Linux Kernel
Netapp H300s -
Netapp H500s -
Netapp H700s -
Netapp H410s -
Netapp H410c -
Debian Debian Linux 10.0
Debian Debian Linux 12.0
NA
CVE-2011-2377
Mozilla Firefox prior to 3.6.18 and 4.x up to and including 4.0.1, Thunderbird prior to 3.1.11, and SeaMonkey up to and including 2.0.14 allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a mu...
Mozilla Seamonkey 1.0
Mozilla Seamonkey 1.0.8
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.0.4
Mozilla Seamonkey 1.0.5
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.1.16
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 2.0
Mozilla Seamonkey 2.0.1
Mozilla Seamonkey 2.0.10
Mozilla Seamonkey 2.0.11
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.0.2
Mozilla Seamonkey 1.1
Mozilla Seamonkey 1.1.1
Mozilla Seamonkey 1.1.14
Mozilla Seamonkey 1.1.15
Mozilla Seamonkey 1.1.4
Mozilla Seamonkey 1.1.5
NA
CVE-2012-2388
The GMP Plugin in strongSwan 4.2.0 up to and including 4.6.3 allows remote malicious users to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA signature verification vulnerability."
Strongswan Strongswan 4.2.16
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.2.6
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.6.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.4.1
Strongswan Strongswan 4.2.11
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.5
Strongswan Strongswan 4.2.0
Strongswan Strongswan 4.3.5
Strongswan Strongswan 4.4.0
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.5.0
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.2.3
Strongswan Strongswan 4.2.4
Strongswan Strongswan 4.3.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »