Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
amit klein vulnerabilities and exploits
(subscribe to this query)
6.7
CVSSv3
CVE-2022-2503
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equiva...
Linux Linux Kernel
NA
CVE-2010-3804
The JavaScript implementation in WebKit in Apple Safari prior to 5.0.3 on Mac OS X 10.5 up to and including 10.6 and Windows, and prior to 4.1.3 on Mac OS X 10.4, uses a weak algorithm for generating values of random numbers, which makes it easier for remote malicious users to tr...
Apple Safari
Apple Safari 5.0.1
Apple Safari 5.0
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.0.1b
Apple Safari 3.0.1
Apple Safari 2.0.3
Apple Safari 1.3.2
Apple Safari 1.2.3
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.0.0
Apple Safari 3.2.2
Apple Safari 3.2.1
Apple Safari 3.0.3b
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3
Apple Safari 2.0.2
Apple Safari 2.0.1
Apple Safari 1.3.0
2 EDB exploits
NA
CVE-2007-2930
The (1) NSID_SHUFFLE_ONLY and (2) NSID_USE_POOL PRNG algorithms in ISC BIND 8 prior to 8.4.7-P1 generate predictable DNS query identifiers when sending outgoing queries such as NOTIFY messages when answering questions as a resolver, which allows remote malicious users to poison D...
Isc Bind
2 EDB exploits
NA
CVE-2008-4787
Visual truncation vulnerability in Microsoft Internet Explorer 6 allows remote malicious users to spoof the address bar via a URL with a hostname containing many (Non-Blocking Space character) sequences, which are rendered as whitespace, aka MSRC ticket MSRC7899, a rel...
Microsoft Internet Explorer 6
1 EDB exploit
NA
CVE-2010-3171
The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 up to and including 3.5.11, 3.6.4 up to and including 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote malicious u...
Mozilla Firefox 3.6.4
Mozilla Firefox 4.0
Mozilla Firefox 3.6.7
Mozilla Firefox 3.6.6
Mozilla Firefox 3.5.11
Mozilla Firefox 3.6.8
Mozilla Firefox 3.5.10
1 EDB exploit
NA
CVE-2003-0718
The WebDAV Message Handler for Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows remote malicious users to cause a denial of service (memory and CPU exhaustion, application crash) via a PROPFIND request with an XML message containing XML elements with a large number of...
Microsoft Internet Information Server 6.0
Microsoft Internet Information Services 5.0
1 EDB exploit
6.8
CVSSv3
CVE-2008-1447
The DNS protocol, as implemented in (1) BIND 8 and 9 prior to 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote malicious users to spoof DNS traffic via a birthday attack th...
Isc Bind 4
Isc Bind 8
Isc Bind 9.2.9
3 EDB exploits
4 Nmap scripts
1 Github repository
5.6
CVSSv3
CVE-2022-23960
Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow th...
Xen Xen -
Arm Cortex-r7 Firmware -
Arm Cortex-r8 Firmware -
Arm Cortex-a57 Firmware -
Arm Cortex-a65 Firmware -
Arm Cortex-a65ae Firmware -
Arm Cortex-a710 Firmware -
Arm Cortex-a72 Firmware -
Arm Cortex-a73 Firmware -
Arm Cortex-a75 Firmware -
Arm Cortex-a76 Firmware -
Arm Cortex-a76ae Firmware -
Arm Cortex-a77 Firmware -
Arm Cortex-a78 Firmware -
Arm Cortex-a78ae Firmware -
Arm Cortex-x1 Firmware -
Arm Cortex-x2 Firmware -
Arm Neoverse-e1 Firmware -
Arm Neoverse-v1 Firmware -
Arm Neoverse N1 Firmware -
Arm Neoverse N2 Firmware -
Debian Debian Linux 9.0
2 Articles
7.8
CVSSv3
CVE-2022-1419
The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.
Linux Linux Kernel
Linux Linux Kernel 5.6
Debian Debian Linux 10.0
3.3
CVSSv3
CVE-2022-33981
drivers/block/floppy.c in the Linux kernel prior to 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.
Linux Linux Kernel
Debian Debian Linux 9.0
Debian Debian Linux 10.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »