Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file browser vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2015-0666
Directory traversal vulnerability in the fmserver servlet in Cisco Prime Data Center Network Manager (DCNM) prior to 7.1(1) allows remote malicious users to read arbitrary files via a crafted pathname, aka Bug ID CSCus00241.
Cisco Prime Data Center Network Manager
Cisco Prime Data Center Network Manager 7.0\\(1\\)
Cisco Prime Data Center Network Manager 6.3\\(1\\)
Cisco Prime Data Center Network Manager 6.3\\(2\\)
4.3
CVSSv2
CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle malicious users...
Opera Opera Browser -
Microsoft Internet Explorer -
Microsoft Windows -
Google Chrome -
Mozilla Firefox -
Siemens Simatic Rf68xr Firmware
Siemens Simatic Rf615r Firmware
Haxx Curl
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.2
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
2 Github repositories
1 Article
4.3
CVSSv2
CVE-2016-5214
Google Chrome before 55.0.2883.75 for Windows mishandled downloaded files, which allowed a remote malicious user to prevent the downloaded file from receiving the Mark of the Web via a crafted HTML page.
Google Chrome
6.8
CVSSv2
CVE-2008-0985
Heap-based buffer overflow in the GIF library in the WebKit framework for Google Android SDK m3-rc37a and previous versions allows remote malicious users to execute arbitrary code via a crafted GIF file whose logical screen height and width are different than the actual height an...
Google Android Sdk M3-rc37a
1 EDB exploit
2.6
CVSSv2
CVE-2018-16075
Insufficient file type enforcement in Blink in Google Chrome before 69.0.3497.81 allowed a remote malicious user to obtain local file data via a crafted HTML page.
Google Chrome
6.8
CVSSv2
CVE-2016-5203
A use after free in PDFium in Google Chrome before 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
6.8
CVSSv2
CVE-2016-5216
A use after free in PDFium in Google Chrome before 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote malicious user to perform an out of bounds memory read via a crafted PDF file.
Google Chrome
6.8
CVSSv2
CVE-2016-5210
Heap buffer overflow during TIFF image parsing in PDFium in Google Chrome before 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
6.8
CVSSv2
CVE-2017-5039
A use after free in PDFium in Google Chrome before 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2017-5032
PDFium in Google Chrome before 57.0.2987.98 for Windows could be made to increment off the end of a buffer, which allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »