Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adriel t. desautels vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2008-2304
Buffer overflow in Apple Core Image Fun House 2.0 and previous versions in CoreImage Examples in Xcode tools prior to 3.1 allows user-assisted malicious users to execute arbitrary code or cause a denial of service (application crash) via a .funhouse file with a string XML element...
Apple Core Image Fun House
1 EDB exploit
5
CVSSv2
CVE-2007-3619
Directory traversal vulnerability in login.php in Maia Mailguard 1.0.2 and previous versions allows remote malicious users to read arbitrary files via a .. (dot dot) in the lang parameter.
Maia Mailguard Maia Mailguard
1 EDB exploit
4.6
CVSSv2
CVE-2006-4866
Buffer overflow in kextload in Apple OS X, as used by TDIXSupport in Roxio Toast Titanium and possibly other products, allows local users to execute arbitrary code via a long extension argument.
Apple Mac Os X 10.0
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.7
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.5
Apple Mac Os X 10.4.2
Apple Mac Os X 10.4.4
Apple Mac Os X Server 10.1.2
Apple Mac Os X Server 10.1.4
Apple Mac Os X Server 10.2.3
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.4.2
Apple Mac Os X Server 10.4.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.2
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
1 EDB exploit
5
CVSSv2
CVE-2006-7235
Teamtek Universal FTP Server 1.0.50 allows remote malicious users to cause a denial of service (daemon crash or hang) via (1) multiple STOR (aka PUT) commands, or an MKD command followed by (2) a '*' argument, (3) a '|' argument, (4) spaces, or (5) a long stri...
5e5 Teamtek Universal Ftp Server 1.0.50
5e5 Teamtek Universal Ftp Server 1.0.44
2 EDB exploits
9.3
CVSSv2
CVE-2009-3873
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x prior to 1.4.2_24 allows remote malicious users to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6...
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jdk 1.5.0
Sun Jre 1.5.0
Sun Sdk 1.4.2 20
Sun Sdk 1.4.2 17
Sun Sdk 1.4.2 13
Sun Sdk 1.4.2 5
Sun Sdk 1.4.2 09
Sun Sdk 1.4.2 01
Sun Jre 1.4.2 12
Sun Jre 1.4.2 13
Sun Jre 1.4.2 9
Sun Jre 1.4.2 8
Sun Jre 1.4.2 06
Sun Jre 1.4.2 03
Sun Jre 1.4.2 16
Sun Jre 1.4.2 17
Sun Sdk 1.4.2 9
Sun Sdk 1.4.2 8
Sun Sdk 1.4.2 11
Sun Sdk 1.4.2 14
9.3
CVSSv2
CVE-2009-3874
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x prior to 1.4.2_24 allows remote malicious users to execute arbitrary code via large subsample...
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jdk 1.5.0
Sun Jre 1.5.0
Sun Sdk 1.4.2 15
Sun Sdk 1.4.2 12
Sun Sdk 1.4.2 3
Sun Sdk 1.4.2 19
Sun Sdk 1.4.2 21
Sun Sdk 1.4.2 4
Sun Sdk 1.4.2 02
Sun Sdk 1.4.2 06
Sun Jre 1.4.2 10
Sun Jre 1.4.2 11
Sun Jre 1.4.2 18
Sun Jre 1.4.2 3
Sun Jre 1.4.2 2
Sun Jre 1.4.2 02
Sun Jre 1.4.2 05
Sun Jre 1.4.2 08
Sun Jre 1.4.2 22
Sun Sdk 1.4.2 7
5
CVSSv2
CVE-2009-3875
The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x prior to 1.3.1_27, and SDK and JRE 1.4.x prior to 1.4.2_24 allows remote malicious users to spoof HMAC-based ...
Sun Sdk 1.4.2 9
Sun Sdk 1.4.2 8
Sun Sdk 1.4.2 20
Sun Sdk 1.4.2 14
Sun Sdk 1.4.2 13
Sun Sdk 1.4.2 10
Sun Sdk 1.4.2 09
Sun Jre 1.4.2 12
Sun Jre 1.4.2 13
Sun Jre 1.4.2 6
Sun Jre 1.4.2 9
Sun Jre 1.4.2 07
Sun Jre 1.4.2 06
Sun Jre 1.4.2 16
Sun Jre 1.4.2 17
Sun Sdk 1.4.2 2
Sun Sdk 1.4.2 17
Sun Sdk 1.4.2 12
Sun Sdk 1.4.2 5
Sun Sdk 1.4.2 21
Sun Sdk 1.4.2 01
Sun Sdk 1.4.2 02
9.3
CVSSv2
CVE-2009-3868
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x prior to 1.3.1_27, and SDK and JRE 1.4.x prior to 1.4.2_24 does not properly parse color profiles, which allows remote malicious users to gain privileges via a crafted image file, a...
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jdk 1.5.0
Sun Jre 1.5.0
Sun Sdk 1.4.2 7
Sun Sdk 1.4.2 6
Sun Sdk 1.4.2 19
Sun Sdk 1.4.2 16
Sun Sdk 1.4.2 4
Sun Sdk 1.4.2 08
Sun Sdk 1.4.2 05
Sun Sdk 1.4.2 07
Sun Jre 1.4.2 18
Sun Jre 1.4.2 14
Sun Jre 1.4.2 2
Sun Jre 1.4.2 5
Sun Jre 1.4.2 04
Sun Sdk 1.4.2 20
Sun Sdk 1.4.2 17
Sun Sdk 1.4.2 2
Sun Sdk 1.4.2 13
Sun Sdk 1.4.2 10
9.3
CVSSv2
CVE-2009-3871
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x prior to 1.3.1_27, and SDK and JRE 1.4.x prior to ...
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jdk 1.5.0
Sun Jre 1.5.0
Sun Sdk 1.4.2 15
Sun Sdk 1.4.2 12
Sun Sdk 1.4.2 3
Sun Sdk 1.4.2 5
Sun Sdk 1.4.2 21
Sun Sdk 1.4.2 02
Sun Sdk 1.4.2 06
Sun Jre 1.4.2 10
Sun Jre 1.4.2 11
Sun Jre 1.4.2 8
Sun Jre 1.4.2 3
Sun Jre 1.4.2 2
Sun Jre 1.4.2 02
Sun Jre 1.4.2 05
Sun Jre 1.4.2 09
Sun Jre 1.4.2 08
Sun Sdk 1.4.2 7
Sun Sdk 1.4.2 6
9.3
CVSSv2
CVE-2009-3872
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x prior to 1.3.1_27, and SDK and JRE 1.4.x prior to 1.4.2_24 allows remote malicious users to gain privileges via a crafted image...
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jdk 1.5.0
Sun Jre 1.5.0
Sun Sdk 1.4.2 20
Sun Sdk 1.4.2 17
Sun Sdk 1.4.2 2
Sun Sdk 1.4.2 13
Sun Sdk 1.4.2 5
Sun Sdk 1.4.2 09
Sun Sdk 1.4.2 01
Sun Jre 1.4.2 12
Sun Jre 1.4.2 13
Sun Jre 1.4.2 6
Sun Jre 1.4.2 9
Sun Jre 1.4.2 8
Sun Jre 1.4.2 06
Sun Jre 1.4.2 03
Sun Jre 1.4.2 16
Sun Jre 1.4.2 17
Sun Sdk 1.4.2 15
Sun Sdk 1.4.2 12
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »