Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arg0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-3073
SSL_Cipher.cpp in EncFS prior to 1.7.0 does not properly handle integer data sizes when constructing headers intended for randomization of initialization vectors, which makes it easier for local users to obtain sensitive information by defeating cryptographic protection mechanism...
Arg0 Encfs 1.4.1.1
Arg0 Encfs 1.4.1
Arg0 Encfs 1.5.0
Arg0 Encfs 1.4.2
Arg0 Encfs 1.4.0
Arg0 Encfs
1 EDB exploit
NA
CVE-2010-3074
SSL_Cipher.cpp in EncFS prior to 1.7.0 uses an improper combination of an AES cipher and a CBC cipher mode for encrypted filesystems, which allows local users to obtain sensitive information via a watermark attack.
Arg0 Encfs 1.4.1
Arg0 Encfs 1.4.0
Arg0 Encfs 1.4.2
Arg0 Encfs 1.4.1.1
Arg0 Encfs
Arg0 Encfs 1.5.0
NA
CVE-2010-3075
EncFS prior to 1.7.0 encrypts multiple blocks by means of the CFB cipher mode with the same initialization vector, which makes it easier for local users to obtain sensitive information via calculations involving recovery of XORed data, as demonstrated by an attack on encrypted da...
Arg0 Encfs 1.4.0
Arg0 Encfs
Arg0 Encfs 1.5.0
Arg0 Encfs 1.4.2
Arg0 Encfs 1.4.1.1
Arg0 Encfs 1.4.1
NA
CVE-2001-0165
Buffer overflow in ximp40 shared library in Solaris 7 and Solaris 8 allows local users to gain privileges via a long "arg0" (process name) argument.
Sun Sunos 5.7
Sun Solaris 8.0
Sun Solaris 7.0
Sun Sunos 5.8
1 EDB exploit
NA
CVE-2001-0190
Buffer overflow in /usr/bin/cu in Solaris 2.8 and previous versions, and possibly other operating systems, allows local users to gain privileges by executing cu with a long program name (arg0).
Sun Sunos 5.7
Sun Sunos
Sun Sunos 5.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.6
NA
CVE-2017_5715
First of all This repository is based on the findings of these 3 repositories: https://github.com/peter-nebe/optee_os/tree/master, https://github.com/jefg89/optee-rpi4/tree/main and most notably https://github.com/joaopeixoto13/OPTEE-RPI4. The idea of this repository is to work a...
1 Github repository
NA
CVE-2018_3639
First of all This repository is based on the findings of these 3 repositories: https://github.com/peter-nebe/optee_os/tree/master, https://github.com/jefg89/optee-rpi4/tree/main and most notably https://github.com/joaopeixoto13/OPTEE-RPI4. The idea of this repository is to work a...
1 Github repository
NA
CVE-2022_23960
First of all This repository is based on the findings of these 3 repositories: https://github.com/peter-nebe/optee_os/tree/master, https://github.com/jefg89/optee-rpi4/tree/main and most notably https://github.com/joaopeixoto13/OPTEE-RPI4. The idea of this repository is to work a...
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started