Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
andrea barisani vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2006-1060
Heap-based buffer overflow in zgv prior to 5.8 and xzgv prior to 0.8 might allow user-assisted malicious users to execute arbitrary code via a JPEG image with more than 3 output components, such as a CMYK or YCCK color space, which causes less memory to be allocated than required...
Xzgv Xzgv
440
VMScore
CVE-2009-2285
Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent malicious users to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
Libtiff Libtiff 3.8.2
2 EDB exploits
828
VMScore
CVE-2009-2347
Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 up to and including 3.8.2, 3.9, and 4.0 allow context-dependent malicious users to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buff...
Libtiff Libtiff 3.8.0
Libtiff Libtiff 3.8.1
Libtiff Libtiff 3.9
Libtiff Libtiff 4.0
Libtiff Libtiff 3.8.2
445
VMScore
CVE-2005-2069
pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote malicious users to sniff the password.
Padl Nss Ldap -
Padl Pam Ldap -
505
VMScore
CVE-2001-1075
poprelayd script prior to 2.0 in Cobalt RaQ3 servers allows remote malicious users to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
Sun Cobalt Raq 3i
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started