Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
c0ntex vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2011-2702
Integer signedness error in Glibc prior to 2.13 and eglibc prior to 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent malicious users to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) me...
Gnu Glibc 2.12.1
Gnu Glibc
Gnu Glibc 2.12
Gnu Eglibc
1 EDB exploit
7.5
CVSSv2
CVE-2005-2665
Stack-based buffer overflow in expires.c in Elm 2.5 PL5 through PL7, and possibly other versions, allows remote malicious users to execute arbitrary code via an e-mail message with a long Expires header.
Elm Development Group Elm 2.5 Pl5
Elm Development Group Elm 2.5 Pl6
Elm Development Group Elm 2.5 Pl7
1 EDB exploit
10
CVSSv2
CVE-2004-0659
Buffer overflow in TranslateFilename for common.c in MPlayer 1.0pre4 allows remote malicious users to execute arbitrary code via a long file name.
Mplayer Mplayer 0.90
Mplayer Mplayer 0.92 Cvs
Mplayer Mplayer 1.0 Pre1
Mplayer Mplayer 0.90 Pre
Mplayer Mplayer 0.90 Rc
Mplayer Mplayer 1.0 Pre2
Mplayer Mplayer 1.0 Pre3
Mplayer Mplayer 0.92
Mplayer Mplayer 0.92.1
Mplayer Mplayer Head Cvs
Mplayer Mplayer 0.90 Rc4
Mplayer Mplayer 0.91
Mplayer Mplayer 1.0 Pre3try2
Mplayer Mplayer 1.0 Pre4
1 EDB exploit
9.3
CVSSv2
CVE-2008-1765
Buffer overflow in Adobe Photoshop Album Starter Edition 3.2, and possibly After Effects CS3, allows user-assisted remote attackers and physically proximate malicious users to execute arbitrary code via a BMP file with an invalid image header. NOTE: the related issue in Photoshop...
Adobe Photoshop 3.2
1 EDB exploit
4.6
CVSSv2
CVE-2006-6410
Buffer overflow in an ActiveX control in VMWare 5.5.1 allows local users to execute arbitrary code via a long VmdbDb parameter to the Initialize function.
Vmware Workstation 5.5.1
1 EDB exploit
4.6
CVSSv2
CVE-2005-4076
Buffer overflow in Appfluent Technology Database IDS 2.0 allows local users to execute arbitrary code via a long APPFLUENT_HOME environment variable.
Appfluent Technology Database Ids 2.0
1 EDB exploit
5.1
CVSSv2
CVE-2005-2710
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote malicious users to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
Realnetworks Helix Player
Realnetworks Realplayer 10.0
1 EDB exploit
5.1
CVSSv2
CVE-2004-1475
Multiple stack-based buffer overflows in xine-lib 1-rc2 through 1-rc5 allow malicious users to execute arbitrary code via (1) long VideoCD vcd:// MRLs or (2) long subtitle lines.
Xine Xine-lib 0.99
Xine Xine 1 Rc3
Xine Xine 1 Rc4
Xine Xine-lib 1 Rc4
Xine Xine-lib 1 Rc5
Xine Xine 0.9.18
Xine Xine 1 Rc2
Xine Xine-lib 1 Rc2
Xine Xine-lib 1 Rc3
Xine Xine 1 Rc5
1 EDB exploit
7.2
CVSSv2
CVE-2002-1155
Buffer overflow in KON kon2 0.3.9b and previous versions allows local users to execute arbitrary code via a long -Coding command line argument.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started