Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
origin vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-2724
Type confusion in V8 in Google Chrome before 113.0.5672.126 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
730
VMScore
CVE-2009-1894
Race condition in PulseAudio 0.9.9, 0.9.10, and 0.9.14 allows local users to gain privileges via vectors involving creation of a hard link, related to the application setting LD_BIND_NOW to 1, and then calling execv on the target of the /proc/self/exe symlink.
Pulseaudio Pulseaudio 0.9.10
Pulseaudio Pulseaudio 0.9.9
Pulseaudio Pulseaudio 0.9.14
2 EDB exploits
755
VMScore
CVE-2002-0189
Cross-site scripting vulnerability in Internet Explorer 6.0 allows remote malicious users to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
383
VMScore
CVE-2009-1309
Mozilla Firefox prior to 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote...
Mozilla Firefox 0.4
Mozilla Firefox 0.5
Mozilla Firefox 0.2
Mozilla Firefox 0.3
Mozilla Firefox 0.9
Mozilla Firefox 0.9.3
Mozilla Firefox 1.0.6
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.8
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.10
Mozilla Firefox 1.5
Mozilla Firefox 1.5.1
Mozilla Firefox 1.5.2
Mozilla Firefox 2.0.0.12
Mozilla Firefox 2.0.0.21
Mozilla Firefox 2.0.0.15
Mozilla Firefox 2.0
Mozilla Firefox 2.0.0.9
Mozilla Firefox 2.0 .1
Mozilla Firefox 3.0.1
Mozilla Firefox 2.0 8
435
VMScore
CVE-2008-4582
Mozilla Firefox 3.0.1 up to and including 3.0.3, Firefox 2.x prior to 2.0.0.18, and SeaMonkey 1.x prior to 1.1.13, when running on Windows, do not properly identify the context of Windows .url shortcut files, which allows user-assisted remote malicious users to bypass the Same Or...
Debian Debian Linux 4.0
Mozilla Firefox 3.0.2
Mozilla Firefox 3.0.1
Mozilla Firefox 3.0.3
Mozilla Firefox 2.0.0.14
Mozilla Firefox 2.0.0.15
Mozilla Firefox 2.0.0.12
Mozilla Firefox 2.0.0.13
Mozilla Firefox 2.0
Mozilla Firefox 2.0.0.1
Mozilla Firefox 2.0.0.16
Mozilla Firefox 2.0.0.17
Mozilla Firefox 2.0.0.10
Mozilla Firefox 2.0.0.11
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 7.10
Mozilla Seamonkey 1.0.5
Mozilla Seamonkey 1.0.4
Mozilla Seamonkey 1.1
Mozilla Seamonkey 1.1.1
1 EDB exploit
215
VMScore
CVE-2009-0028
The clone system call in the Linux kernel 2.6.28 and previous versions allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
Linux Linux Kernel 2.6
Linux Linux Kernel 2.4.36.6
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.13.4
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.14.1
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.15.7
Linux Linux Kernel 2.6.16.19
Linux Linux Kernel 2.6.16.14
Linux Linux Kernel 2.6.16.26
Linux Linux Kernel 2.6.16.25
Linux Linux Kernel 2.6.16.33
Linux Linux Kernel 2.6.16.34
Linux Linux Kernel 2.6.16.38
1 EDB exploit
605
VMScore
CVE-2009-1307
The view-source: URI implementation in Mozilla Firefox prior to 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote malicious users to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file...
Mozilla Firefox 0.1
Mozilla Firefox 0.10
Mozilla Firefox 0.8
Mozilla Firefox 0.9.1
Mozilla Firefox 0.9
Mozilla Firefox 0.9 Rc
Mozilla Firefox 1.0.4
Mozilla Firefox 1.0.7
Mozilla Firefox 1.5.0.12
Mozilla Firefox 1.5.0.1
Mozilla Firefox 1.5.3
Mozilla Firefox 1.5.4
Mozilla Firefox 2.0
Mozilla Firefox 1.8
Mozilla Firefox 2.0.0.14
Mozilla Firefox 2.0.0.18
Mozilla Firefox 2.0.0.2
Mozilla Firefox 2.0.0.16
Mozilla Firefox 2.0.0.5
Mozilla Firefox 2.0.0.4
Mozilla Firefox 3.0.7
Mozilla Firefox 3.0.5
668
VMScore
CVE-2008-5022
The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x prior to 3.0.4, Firefox 2.x prior to 2.0.0.18, Thunderbird 2.x prior to 2.0.0.18, and SeaMonkey 1.x prior to 1.1.13 allows remote malicious users to bypass the same-origin policy and execute arbitrary script via mul...
Mozilla Firefox
Mozilla Thunderbird
Mozilla Seamonkey
Debian Debian Linux 4.0
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.04
515
VMScore
CVE-2010-3573
Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from t...
Sun Jre 1.6.0
Sun Jre
Sun Jdk 1.6.0
Sun Jdk
Sun Jdk 1.5.0
Sun Jre 1.5.0
1 EDB exploit
383
VMScore
CVE-2010-1207
Mozilla Firefox prior to 3.6.7 and Thunderbird prior to 3.1.1 do not properly implement read restrictions for CANVAS elements, which allows remote malicious users to obtain sensitive cross-origin information via vectors involving reference retention and node deletion.
Mozilla Firefox 3.6
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.4
Mozilla Firefox
Mozilla Firefox 3.6.3
Mozilla Thunderbird
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »