Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
x86 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3523
Format string vulnerability in friendsd2 in GpsDrive allows remote malicious users to execute arbitrary code via the dir (direction) field.
Gpsdrive Gpsdrive
2 EDB exploits
NA
CVE-2004-1561
Buffer overflow in Icecast 2.0.1 and previous versions allows remote malicious users to execute arbitrary code via an HTTP request with a large number of headers.
Icecast Icecast 2.0
Icecast Icecast 2.0.1
3 EDB exploits
10 Github repositories
NA
CVE-2011-3478
The host-services component in Symantec pcAnywhere 12.5.x up to and including 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and authentication data, which allows remote malicious users to execute arbitrar...
Symantec Pcanywhere 12.6.7580
Symantec Pcanywhere 12.5.539
Symantec Pcanywhere 12.5
Symantec Pcanywhere 12.6.65
2 EDB exploits
NA
CVE-2009-2484
Stack-based buffer overflow in the Win32AddConnection function in modules/access/smb.c in VideoLAN VLC media player 0.9.9, when running on Microsoft Windows, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a l...
Videolan Vlc Media Player 0.9.9
2 EDB exploits
5.5
CVSSv3
CVE-2020-29566
An issue exists in Xen up to and including 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is resched...
Xen Xen
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
NA
CVE-2007-4441
Buffer overflow in php_win32std.dll in the win32std extension for PHP 5.2.0 and previous versions allows context-dependent malicious users to execute arbitrary code via a long string in the filename argument to the win_browse_file function.
Php Php
3 EDB exploits
NA
CVE-2015-2044
The emulation routines for unspecified X86 devices in Xen 3.2.x up to and including 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
Xen Xen 4.4.0
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 4.0.3
Xen Xen 4.0.4
Xen Xen 4.1.6.1
Xen Xen 4.2.0
Xen Xen 4.4.1
Xen Xen 4.5.0
Xen Xen 3.2.0
Xen Xen 3.2.1
Xen Xen 3.2.2
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 4.1.0
Xen Xen 4.1.1
Xen Xen 4.2.1
Xen Xen 4.2.2
Xen Xen 4.2.3
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 4.0.1
NA
CVE-2015-2045
The HYPERVISOR_xen_version hypercall in Xen 3.2.x up to and including 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
Xen Xen 3.2.1
Xen Xen 3.2.2
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 3.4.4
Xen Xen 4.1.1
Xen Xen 4.1.2
Xen Xen 4.2.2
Xen Xen 4.2.3
Xen Xen 3.2.3
Xen Xen 3.3.0
Xen Xen 4.0.0
Xen Xen 4.0.1
Xen Xen 4.1.3
Xen Xen 4.1.4
Xen Xen 4.3.0
Xen Xen 4.3.1
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 4.0.2
Xen Xen 4.0.3
Xen Xen 4.1.5
NA
CVE-2004-0209
Unknown vulnerability in the Graphics Rendering Engine processes of Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote malicious users to execute arbitrary code via (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats that involve "a...
Microsoft Windows 2003 Server R2
Microsoft Windows Xp
Microsoft Windows 2000
1 EDB exploit
6.5
CVSSv3
CVE-2021-28690
x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires s...
Xen Xen
Xen Xen 4.15.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »