Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 19 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2014-1525
The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox prior to 29.0 and SeaMonkey prior to 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote malicious users to execute arbitrary code or cause a denial of service (use...
Mozilla Firefox
Mozilla Seamonkey
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 14.04
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Fedoraproject Fedora 19
605
VMScore
CVE-2014-1526
The XrayWrapper implementation in Mozilla Firefox prior to 29.0 and SeaMonkey prior to 2.26 allows user-assisted remote malicious users to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM...
Mozilla Firefox
Mozilla Seamonkey
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 14.04
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Fedoraproject Fedora 19
445
VMScore
CVE-2014-1527
Mozilla Firefox prior to 29.0 on Android allows remote malicious users to spoof the address bar via crafted JavaScript code that uses DOM events to prevent the reemergence of the actual address bar after scrolling has taken it off of the screen.
Fedoraproject Fedora 19
Mozilla Firefox
Mozilla Firefox 27.0.1
Mozilla Firefox 27.0
Mozilla Firefox 26.0
Mozilla Firefox 0.9
Mozilla Firefox 0.9.1
Mozilla Firefox 0.9.2
Mozilla Firefox 0.9.3
Mozilla Firefox 1.5.0.1
Mozilla Firefox 1.5.0.10
Mozilla Firefox 1.5.0.11
Mozilla Firefox 1.5.0.12
Mozilla Firefox 1.5.5
Mozilla Firefox 1.5.6
Mozilla Firefox 1.5.7
Mozilla Firefox 1.5.8
Mozilla Firefox 2.0.0.20
Mozilla Firefox 2.0.0.3
Mozilla Firefox 2.0.0.4
Mozilla Firefox 2.0.0.5
Mozilla Firefox 3.0.15
890
VMScore
CVE-2014-1528
The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote malicious users to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS el...
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 12.04
Opensuse Opensuse 13.1
Opensuse Project Opensuse 12.3
Oracle Solaris 11.3
Mozilla Firefox 28.0
Mozilla Seamonkey 2.25
Fedoraproject Fedora 19
578
VMScore
CVE-2014-2328
lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and previous versions allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Cacti Cacti
Fedoraproject Fedora 20
Fedoraproject Fedora 19
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Debian Debian Linux 7.0
356
VMScore
CVE-2014-1517
The login form in Bugzilla 2.x, 3.x, 4.x prior to 4.4.3, and 4.5.x prior to 4.5.3 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to log...
Mozilla Bugzilla 3.0.4
Mozilla Bugzilla 3.0
Mozilla Bugzilla 3.6.9
Mozilla Bugzilla 4.1.1
Mozilla Bugzilla 3.1.3
Mozilla Bugzilla 2.0
Mozilla Bugzilla 2.18.6\\+
Mozilla Bugzilla 2.16.8
Mozilla Bugzilla 4.3.1
Mozilla Bugzilla 3.0.0
Mozilla Bugzilla 2.22.7
Mozilla Bugzilla 3.7.2
Mozilla Bugzilla 3.4.3
Mozilla Bugzilla 3.3.2
Mozilla Bugzilla 4.3.2
Mozilla Bugzilla 3.0.1
Mozilla Bugzilla 2.18.8
Mozilla Bugzilla 2.17.6
Mozilla Bugzilla 2.16
Mozilla Bugzilla 4.2
Mozilla Bugzilla 3.2
Mozilla Bugzilla 2.18.5
668
VMScore
CVE-2014-2286
main/http.c in Asterisk Open Source 1.8.x prior to 1.8.26.1, 11.8.x prior to 11.8.1, and 12.1.x prior to 12.1.1, and Certified Asterisk 1.8.x prior to 1.8.15-cert5 and 11.6 prior to 11.6-cert2, allows remote malicious users to cause a denial of service (stack consumption) and pos...
Digium Asterisk 12.1.0
Digium Asterisk 1.8.26.0
Digium Asterisk 1.8.25.0
Digium Asterisk 1.8.22.0
Digium Asterisk 1.8.21.0
Digium Asterisk 1.8.15.0
Digium Asterisk 1.8.14.1
Digium Asterisk 1.8.14.0
Digium Asterisk 1.8.0
Digium Asterisk 1.8.10.0
Digium Asterisk 1.8.10.1
Digium Asterisk 1.8.11.0
Digium Asterisk 1.8.15.1
Digium Asterisk 1.8.19.0
Digium Asterisk 1.8.19.1
Digium Asterisk 1.8.2
Digium Asterisk 1.8.2.1
Digium Asterisk 1.8.4
Digium Asterisk 1.8.4.1
Digium Asterisk 1.8.4.2
Digium Asterisk 1.8.8.0
Fedoraproject Fedora 19
312
VMScore
CVE-2014-2287
channels/chan_sip.c in Asterisk Open Source 1.8.x prior to 1.8.26.1, 11.8.x prior to 11.8.1, and 12.1.x prior to 12.1.1, and Certified Asterisk 1.8.15 prior to 1.8.15-cert5 and 11.6 prior to 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users ...
Digium Certified Asterisk 11.6.0
Digium Certified Asterisk 1.8.15
Digium Certified Asterisk 1.8.12.0
Digium Certified Asterisk 1.8.10.0
Digium Certified Asterisk 1.8.8.0
Digium Certified Asterisk 1.8.6.0
Digium Certified Asterisk 1.8.4.0
Digium Certified Asterisk 1.8.3.0
Digium Certified Asterisk 1.8.1.0
Digium Certified Asterisk 1.8.0.0
Digium Certified Asterisk 11.6
Digium Certified Asterisk 1.8.14.0
Digium Certified Asterisk 1.8.13.0
Digium Certified Asterisk 1.8.9.0
Digium Certified Asterisk 1.8.5.0
Digium Certified Asterisk 1.8.11.0
Digium Certified Asterisk 1.8.7.0
Digium Certified Asterisk 1.8.2.0
Digium Asterisk 12.1.0
Digium Asterisk 1.8.25.0
Digium Asterisk 1.8.24.1
Digium Asterisk 1.8.23.0
357
VMScore
CVE-2010-5298
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL up to and including 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote malicious users to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL conn...
Openssl Openssl
Mariadb Mariadb
Fedoraproject Fedora 20
Fedoraproject Fedora 19
Suse Linux Enterprise Server 12
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Workstation Extension 12
1 Article
643
VMScore
CVE-2014-0160
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 prior to 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote malicious users to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrat...
Openssl Openssl
Filezilla-project Filezilla Server
Siemens Application Processing Engine Firmware 2.0
Siemens Cp 1543-1 Firmware 1.1
Siemens Simatic S7-1500 Firmware 1.5
Siemens Simatic S7-1500t Firmware 1.5
Siemens Elan-8.2
Siemens Wincc Open Architecture 3.12
Intellian V100 Firmware 1.20
Intellian V100 Firmware 1.21
Intellian V100 Firmware 1.24
Intellian V60 Firmware 1.15
Intellian V60 Firmware 1.25
Mitel Micollab 6.0
Mitel Micollab 7.0
Mitel Micollab 7.1
Mitel Micollab 7.2
Mitel Micollab 7.3.0.104
Mitel Micollab 7.3
Mitel Mivoice 1.1.3.3
Mitel Mivoice 1.2.0.11
Mitel Mivoice 1.3.2.2
4 EDB exploits
2 Nmap scripts
309 Github repositories
4 Articles
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »