Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
andreas vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2019-5784
Incorrect handling of deferred code in V8 in Google Chrome before 72.0.3626.96 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
NA
CVE-2010-1198
Use-after-free vulnerability in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, allows remote malicious users to execute arbitrary code via vectors involving multiple plugin instances.
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 2.0
6.5
CVSSv3
CVE-2019-5775
Incorrect handling of a confusable character in Omnibox in Google Chrome before 72.0.3626.81 allowed a remote malicious user to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
6.5
CVSSv3
CVE-2019-5778
A missing case for handling special schemes in permission request checks in Extensions in Google Chrome before 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Ex...
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
4.3
CVSSv3
CVE-2019-5779
Insufficient policy validation in ServiceWorker in Google Chrome before 72.0.3626.81 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
8.8
CVSSv3
CVE-2019-5783
Missing URI encoding of untrusted input in DevTools in Google Chrome before 72.0.3626.81 allowed a remote malicious user to perform a Dangling Markup Injection attack via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
NA
CVE-2010-1202
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, Thunderbird prior to 3.0.5, and SeaMonkey prior to 2.0.5 allow remote malicious users to cause a denial of service (memory corruption and application c...
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 2.0
NA
CVE-2010-1196
Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, Thunderbird prior to 3.0.5, and SeaMonkey prior to 2.0.5 allows remote malicious users to execute arbitrary code via a DOM node with a long te...
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 2.0
NA
CVE-2010-1197
Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote mal...
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 2.0
NA
CVE-2010-1200
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, Thunderbird prior to 3.0.5, and SeaMonkey prior to 2.0.5 allow remote malicious users to cause a denial of service (memory corruption and application cras...
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.1.8
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.9
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 2.0.3
Mozilla Seamonkey 2.0.2
Mozilla Seamonkey 1.1.17
Mozilla Seamonkey 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »