Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
skd vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-0833
Heap-based buffer overflow in gen_msn.dll in the gen_msn plugin 0.31 for Winamp 5.541 allows remote malicious users to execute arbitrary code via a playlist (.pls) file with a long URL in the File1 field. NOTE: some of these details are obtained from third party information.
Myplugins Gen Msn 0.31
1 EDB exploit
NA
CVE-2008-3877
Stack-based buffer overflow in Acoustica Mixcraft 4.1 Build 96 and 4.2 Build 98 allows user-assisted malicious users to execute arbitrary code via a crafted .mx4 file. NOTE: it was later reported that version 3 is also affected.
Acoustica Mixcraft 4.2
Acoustica Mixcraft 3.0
Acoustica Mixcraft 4.1
2 EDB exploits
NA
CVE-2009-1257
Heap-based buffer overflow in Magic ISO Maker 5.5 build 0274 allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via a crafted CCD file.
Magic Iso Maker Magic Iso Maker 5.5
2 EDB exploits
NA
CVE-2008-5036
Stack-based buffer overflow in VideoLAN VLC media player 0.9.x prior to 0.9.6 might allow user-assisted malicious users to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was...
Videolan Vlc Media Player 0.9.0
Videolan Vlc Media Player 0.9.4
Videolan Vlc Media Player 0.9.1
Videolan Vlc Media Player 0.9.5
Videolan Vlc Media Player 0.9.2
Videolan Vlc Media Player 0.9
Videolan Vlc Media Player 0.9.3
2 EDB exploits
NA
CVE-2009-0837
Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote malicious users to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a...
Foxit Reader3.0
2 EDB exploits
NA
CVE-2009-1260
Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and previous versions allow remote malicious users to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.
Ezbsystems Ultraiso 9.2
Ezbsystems Ultraiso 9.1.2
Ezbsystems Ultraiso 8.51
Ezbsystems Ultraiso 8.2
Ezbsystems Ultraiso 7.6
Ezbsystems Ultraiso 7.56
Ezbsystems Ultraiso 7.22 Me
Ezbsystems Ultraiso 7.21 Sr-2
Ezbsystems Ultraiso 7.21 Sr-1
Ezbsystems Ultraiso 6.52
Ezbsystems Ultraiso 6.51
Ezbsystems Ultraiso 5.0
Ezbsystems Ultraiso 5.1
Ezbsystems Ultraiso 9.0
Ezbsystems Ultraiso 8.66
Ezbsystems Ultraiso 8.65
Ezbsystems Ultraiso 8.12
Ezbsystems Ultraiso 8
Ezbsystems Ultraiso 7.55
Ezbsystems Ultraiso 7.52
Ezbsystems Ultraiso 7.1
Ezbsystems Ultraiso 7.0
2 EDB exploits
NA
CVE-2008-4449
Stack-based buffer overflow in mIRC 6.34 allows remote malicious users to execute arbitrary code via a long hostname in a PRIVMSG message.
Mirc Mirc 6.34
3 EDB exploits
8.8
CVSSv3
CVE-2009-0182
Buffer overflow in VUPlayer 2.49 and previous versions allows user-assisted malicious users to execute arbitrary code via a long URL in a File line in a .pls file, as demonstrated by an http URL on a File1 line.
Vuplayer Vuplayer
1 EDB exploit
3 Github repositories
NA
CVE-2006-4948
Stack-based buffer overflow in tftpd.exe in ProSysInfo TFTP Server TFTPDWIN 0.4.2 and previous versions allows remote malicious users to execute arbitrary code or cause a denial of service via a long file name. NOTE: the provenance of this information is unknown; the details are ...
Prosysinfo Tftp Server Tftpdwin
3 EDB exploits
NA
CVE-2008-5405
Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel 4.9.23 and 4.9.24, and possibly earlier, allows remote malicious users to execute arbitrary code via an RDP file containing a long string.
Oxid Cain And Abel 4.9.24
Oxid Cain And Abel 4.9.23
4 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »