Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tavis ormandy vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-0172
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent malicious users to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
Boost Boost 1.34
Boost Boost 1.33
NA
CVE-2008-0171
regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent malicious users to cause a denial of service (failed assertion and crash) via an invalid regular expression.
Boost Boost 1.33
Boost Boost 1.34
Boost Boost Regex Library
NA
CVE-2005-1544
Stack-based buffer overflow in libTIFF prior to 3.7.2 allows remote malicious users to execute arbitrary code via a TIFF file with a malformed BitsPerSample tag.
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.5.2
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.7.0
Libtiff Libtiff 3.7.1
Libtiff Libtiff 3.5.6
Libtiff Libtiff 3.5.7
1 EDB exploit
NA
CVE-2009-1895
The personality subsystem in the Linux kernel prior to 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memor...
Linux Linux Kernel
Linux Linux Kernel 2.6.31
Debian Debian Linux 5.0
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
NA
CVE-2009-2406
Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel prior to 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCr...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.29
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
NA
CVE-2009-2407
Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel prior to 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryp...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.11.10
7.8
CVSSv3
CVE-2009-2692
The Linux kernel 2.6.0 up to and including 2.6.30.4, and 2.4.4 up to and including 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap t...
Linux Linux Kernel
Debian Debian Linux 4.0
Suse Linux Enterprise Real Time 10
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Server Aus 5.3
Redhat Enterprise Linux Eus 5.3
Redhat Enterprise Linux Eus 4.8
8 EDB exploits
4 Github repositories
NA
CVE-2006-3459
Multiple stack-based buffer overflows in the TIFF library (libtiff) prior to 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent malicious users to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_cou...
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.4
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.7.0
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.6
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.5.2
Libtiff Libtiff 3.7.1
Libtiff Libtiff 3.7.3
Libtiff Libtiff 3.7.4
Libtiff Libtiff
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.8.0
Libtiff Libtiff 3.7.2
6 EDB exploits
NA
CVE-2006-3460
Heap-based buffer overflow in the JPEG decoder in the TIFF library (libtiff) prior to 3.8.2 allows context-dependent malicious users to cause a denial of service and possibly execute arbitrary code via an encoded JPEG stream that is longer than the scan line size (TiffScanLineSiz...
Libtiff Libtiff
NA
CVE-2006-3461
Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) prior to 3.8.2 might allow context-dependent malicious users to execute arbitrary code via unknown vectors.
Libtiff Libtiff
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »