Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
c0ntex vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-2702
Integer signedness error in Glibc prior to 2.13 and eglibc prior to 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent malicious users to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) me...
Gnu Glibc 2.12.1
Gnu Glibc
Gnu Glibc 2.12
Gnu Eglibc
1 EDB exploit
NA
CVE-2008-1765
Buffer overflow in Adobe Photoshop Album Starter Edition 3.2, and possibly After Effects CS3, allows user-assisted remote attackers and physically proximate malicious users to execute arbitrary code via a BMP file with an invalid image header. NOTE: the related issue in Photoshop...
Adobe Photoshop 3.2
1 EDB exploit
NA
CVE-2006-6410
Buffer overflow in an ActiveX control in VMWare 5.5.1 allows local users to execute arbitrary code via a long VmdbDb parameter to the Initialize function.
Vmware Workstation 5.5.1
1 EDB exploit
NA
CVE-2004-1475
Multiple stack-based buffer overflows in xine-lib 1-rc2 through 1-rc5 allow malicious users to execute arbitrary code via (1) long VideoCD vcd:// MRLs or (2) long subtitle lines.
Xine Xine-lib 0.99
Xine Xine 1 Rc3
Xine Xine 1 Rc4
Xine Xine-lib 1 Rc4
Xine Xine-lib 1 Rc5
Xine Xine 0.9.18
Xine Xine 1 Rc2
Xine Xine-lib 1 Rc2
Xine Xine-lib 1 Rc3
Xine Xine 1 Rc5
1 EDB exploit
NA
CVE-2005-2710
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote malicious users to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
Realnetworks Helix Player
Realnetworks Realplayer 10.0
1 EDB exploit
NA
CVE-2005-2665
Stack-based buffer overflow in expires.c in Elm 2.5 PL5 through PL7, and possibly other versions, allows remote malicious users to execute arbitrary code via an e-mail message with a long Expires header.
Elm Development Group Elm 2.5 Pl5
Elm Development Group Elm 2.5 Pl6
Elm Development Group Elm 2.5 Pl7
1 EDB exploit
NA
CVE-2004-0659
Buffer overflow in TranslateFilename for common.c in MPlayer 1.0pre4 allows remote malicious users to execute arbitrary code via a long file name.
Mplayer Mplayer 0.90
Mplayer Mplayer 0.92 Cvs
Mplayer Mplayer 1.0 Pre1
Mplayer Mplayer 0.90 Pre
Mplayer Mplayer 0.90 Rc
Mplayer Mplayer 1.0 Pre2
Mplayer Mplayer 1.0 Pre3
Mplayer Mplayer 0.92
Mplayer Mplayer 0.92.1
Mplayer Mplayer Head Cvs
Mplayer Mplayer 0.90 Rc4
Mplayer Mplayer 0.91
Mplayer Mplayer 1.0 Pre3try2
Mplayer Mplayer 1.0 Pre4
1 EDB exploit
NA
CVE-2005-4076
Buffer overflow in Appfluent Technology Database IDS 2.0 allows local users to execute arbitrary code via a long APPFLUENT_HOME environment variable.
Appfluent Technology Database Ids 2.0
1 EDB exploit
NA
CVE-2002-1155
Buffer overflow in KON kon2 0.3.9b and previous versions allows local users to execute arbitrary code via a long -Coding command line argument.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started