Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
guido landi vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-1044
Mozilla Firefox 3.0.7 on Windows 7 allows remote malicious users to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition...
Mozilla Firefox 3.0.7
NA
CVE-2009-1169
The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox prior to 3.0.8 and SeaMonkey prior to 1.1.16 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.
Mozilla Firefox 2.0.0.14
Mozilla Firefox 2.0.0.12
Mozilla Firefox 3.0.1
Mozilla Firefox 0.9
Mozilla Firefox 2.0
Mozilla Firefox 1.0.3
Mozilla Firefox 0.10.1
Mozilla Firefox 0.9.1
Mozilla Firefox 2.0.0.19
Mozilla Firefox 3.0
Mozilla Firefox 0.9.3
Mozilla Firefox 0.9.2
Mozilla Firefox 1.0.2
Mozilla Firefox 2.0 .1
Mozilla Firefox 2.0 .10
Mozilla Firefox 2.0.0.21
Mozilla Firefox 2.0.0.17
Mozilla Firefox 0.7
Mozilla Firefox 0.7.1
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.5
Mozilla Firefox 1.5.0.10
1 EDB exploit
NA
CVE-2008-4686
Multiple integer overflows in ty.c in the TY demux plugin (aka the TiVo demuxer) in VideoLAN VLC media player, probably 0.9.4, might allow remote malicious users to execute arbitrary code via a crafted .ty file, a different vulnerability than CVE-2008-4654.
Videolan Vlc Media Player 0.9.0
Videolan Vlc Media Player 0.9.4
Videolan Vlc Media Player 0.9.1
Videolan Vlc Media Player 0.9.2
Videolan Vlc Media Player 0.9.3
2 EDB exploits
NA
CVE-2008-2737
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3558. Reason: This candidate is a duplicate of CVE-2008-3558. Notes: All CVE users should reference CVE-2008-3558 instead of this candidate. All references and descriptions in this candidate have been removed...
1 EDB exploit
NA
CVE-2008-2835
SQL injection vulnerability in cgi-bin/igsuite in IGSuite 3.2.4 allows remote malicious users to execute arbitrary SQL commands via the formid parameter.
Igsuite Igsuite 3.2.4
1 EDB exploit
NA
CVE-2008-1105
Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 up to and including 3.0.29 allows remote malicious users to execute arbitrary code via a crafted SMB response.
Samba Samba
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 4.0
1 EDB exploit
NA
CVE-2008-1801
Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.
Rdesktop Rdesktop 1.5.0
1 EDB exploit
NA
CVE-2008-1802
Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote malicious users to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
Rdesktop Rdesktop 1.5.0
1 EDB exploit
NA
CVE-2008-1878
Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and previous versions allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.
Xine Xine-lib 1.1.9
Xine Xine-lib
Xine Xine-lib 1.1.0
Xine Xine-lib 1.1.1
Xine Xine-lib 1.1.10
Xine Xine-lib 1.1.10.1
Xine Xine-lib 1.1.11
Xine Xine-lib 1.1.11.1
1 EDB exploit
NA
CVE-2008-1774
SQL injection vulnerability in editlink.php in Pligg 9.9.0 allows remote malicious users to execute arbitrary SQL commands via the id parameter.
Pligg Pligg Cms 9.9.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »