Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
andreas vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2004-0003
Unknown vulnerability in Linux kernel prior to 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."
Linux Linux Kernel
4.6
CVSSv2
CVE-2004-0109
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.5.0
7.2
CVSSv2
CVE-2004-0010
Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.13
9.3
CVSSv2
CVE-2010-0183
Use-after-free vulnerability in the nsCycleCollector::MarkRoots function in Mozilla Firefox 3.5.x prior to 3.5.10 and SeaMonkey prior to 2.0.5 allows remote malicious users to execute arbitrary code via a crafted HTML document, related to an improper frame construction process fo...
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 2.0.1
Mozilla Seamonkey 2.0
Mozilla Seamonkey 1.1.19
Mozilla Seamonkey 1.1.18
Mozilla Seamonkey 1.1.11
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.1.2
Mozilla Seamonkey 1.1.1
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.5
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
5
CVSSv2
CVE-2004-0177
The ext3 code in Linux 2.4.x prior to 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by re...
Linux Linux Kernel 2.4.0
2.1
CVSSv2
CVE-2004-0178
The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x prior to 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes.
Linux Linux Kernel 2.4.0
4.3
CVSSv2
CVE-2019-5784
Incorrect handling of deferred code in V8 in Google Chrome before 72.0.3626.96 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
9.3
CVSSv2
CVE-2010-1198
Use-after-free vulnerability in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, allows remote malicious users to execute arbitrary code via vectors involving multiple plugin instances.
Mozilla Firefox 3.5
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.6
Mozilla Seamonkey 2.0.1
Mozilla Seamonkey 2.0
Mozilla Seamonkey 1.1.19
Mozilla Seamonkey 1.1.18
Mozilla Seamonkey 1.1.11
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.1.2
Mozilla Seamonkey 1.1.1
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.5
Mozilla Seamonkey 1.0
Mozilla Seamonkey 1.1.17
4.3
CVSSv2
CVE-2019-5775
Incorrect handling of a confusable character in Omnibox in Google Chrome before 72.0.3626.81 allowed a remote malicious user to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
4.3
CVSSv2
CVE-2019-5778
A missing case for handling special schemes in permission request checks in Extensions in Google Chrome before 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Ex...
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »