Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bridge cc vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-8239
Adobe Bridge CC versions 9.1 and previous versions have a memory corruption vulnerability. Successful exploitation could lead to information disclosure.
Adobe Bridge Cc
7.5
CVSSv3
CVE-2019-8240
Adobe Bridge CC versions 9.1 and previous versions have a memory corruption vulnerability. Successful exploitation could lead to information disclosure.
Adobe Bridge Cc
6.5
CVSSv3
CVE-2019-7133
Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Adobe Bridge Cc 9.0.2
6.5
CVSSv3
CVE-2019-7135
Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Adobe Bridge Cc 9.0.2
6.5
CVSSv3
CVE-2019-7138
Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Adobe Bridge Cc 9.0.2
8.8
CVSSv3
CVE-2019-7132
Adobe Bridge CC versions 9.0.2 have an out-of-bounds write vulnerability. Successful exploitation could lead to remote code execution.
Adobe Bridge Cc 9.0.2
6.5
CVSSv3
CVE-2019-7963
Adobe Bridge CC version 9.0.2 and previous versions versions have an out of bound read vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
Adobe Bridge Cc
NA
CVE-2023-52644
In the Linux kernel, the following vulnerability has been resolved: wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled When QoS is disabled, the queue priority value will not map to the correct ieee80211 queue since there is only one queue. Stop/wake queue 0 w...
NA
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.11
4 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2