Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
atom vulnerabilities and exploits
(subscribe to this query)
4.7
CVSSv3
CVE-2020-35897
An issue exists in the atom crate prior to 0.3.6 for Rust. An unsafe Send implementation allows a cross-thread data race.
Atom Project Atom
6.5
CVSSv3
CVE-2020-24513
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Intel Atom C3308 -
Intel Atom C3336 -
Intel Atom C3338 -
Intel Atom C3338r -
Intel Atom C3436l -
Intel Atom C3508 -
Intel Atom C3538 -
Intel Atom C3558 -
Intel Atom C3558r -
Intel Atom C3558rc -
Intel Atom C3708 -
Intel Atom C3750 -
Intel Atom C3758 -
Intel Atom C3758r -
Intel Atom C3808 -
Intel Atom C3830 -
Intel Atom C3850 -
Intel Atom C3858 -
Intel Atom C3950 -
Intel Atom C3955 -
Intel Atom C3958 -
Intel Atom P5942b -
8.8
CVSSv3
CVE-2018-1000006
GitHub Electron versions 1.8.2-beta.3 and previous versions, 1.7.10 and previous versions, 1.6.15 and previous versions has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked i...
Atom Electron 1.8.2
Atom Electron
2 EDB exploits
2 Github repositories
2 Articles
8.1
CVSSv3
CVE-2016-10620
atom-node-module-installer installs node modules for atom-shell applications. atom-node-module-installer binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an at...
Atom-node-module-installer Project Atom-node-module-installer
4.3
CVSSv3
CVE-2017-1000424
Github Electron version 1.6.4 - 1.6.11 and 1.7.0 - 1.7.5 is vulnerable to a URL Spoofing problem when opening PDFs in PDFium resulting loading arbitrary PDFs that a hacker can control.
Atom Electron
7.8
CVSSv3
CVE-2016-1202
Untrusted search path vulnerability in Atom Electron prior to 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.
Atom Electron
NA
CVE-2007-3134
Multiple cross-site scripting (XSS) vulnerabilities in atomPhotoBlog.php in Atom PhotoBlog 1.0.9 and previous versions allow remote malicious users to inject arbitrary web script or HTML via the (1) Your Name, (2) Your Homepage, and (3) Your Comment fields, when using "Appro...
Atom Photoblog
1 EDB exploit
NA
CVE-2007-3135
Cross-site scripting (XSS) vulnerability in atomPhotoBlog.php in Atom Photoblog 1.0.9 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the tag parameter.
Atom Photoblog
NA
CVE-2008-0275
The Atom 4.7 prior to 4.7.x-1.0 and 5.x prior to 5.x-1.0 module for Drupal does not properly manage permissions for node (1) titles, (2) teasers, and (3) bodies, which might allow remote malicious users to gain access to syndicated content.
Drupal Atom Module
7.6
CVSSv3
CVE-2018-3652
Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence malicious user to potentially access platform secre...
Intel Xeon E3 1245 V6 -
Intel Xeon E3 1240 V6 -
Intel Xeon E3 1501l V6 -
Intel Xeon E3 1501m V6 -
Intel Xeon E3 1260l V5 -
Intel Xeon E3 1230 V5 -
Intel Xeon E3 1268l V5 -
Intel Xeon E3 1505m V5 -
Intel Xeon E3 1515m V5
Intel Xeon E3 1585 V5
Intel Xeon E3 1585l V5
Intel Xeon E3 1220 V6 -
Intel Xeon E3 1245 V5 -
Intel Xeon E3 1240l V5 -
Intel Xeon E3 1240 V5 -
Intel Xeon E3 1220 V5 -
Intel Xeon E3 1545m V5
Intel Xeon E3 1558l V5
Intel Xeon E3 1575m V5
Intel Xeon E3 1565l V5
Intel Xeon E3 1535m V6
Intel Xeon E3 1505l V6 -
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »