Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
charalambous glafkos vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2015-2291
(1) IQVW32.sys prior to 1.3.1.0 and (2) IQVW64.sys prior to 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8...
Intel Ethernet Diagnostics Driver Iqvw32.sys 1.03.0.7
Intel Ethernet Diagnostics Driver Iqvw64.sys 1.03.0.7
1 EDB exploit
3 Github repositories
4.3
CVSSv2
CVE-2008-6278
Multiple cross-site scripting (XSS) vulnerabilities in product.php in RakhiSoftware Price Comparison Script (aka Shopping Cart) allow remote malicious users to inject arbitrary web script or HTML via the (1) category_id and (2) subcategory_id parameters.
Rakhisoftware Rakhisoftware Shopping Cart -
1 EDB exploit
9.3
CVSSv2
CVE-2010-3149
Untrusted search path vulnerability in Adobe Device Central CS5 3.0.0(376), 3.0.1.0 (3027), and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse qtcf.dll that is located in th...
Adobe Device Central Cs5 3.0.0\\(376\\)
1 EDB exploit
9.3
CVSSv2
CVE-2010-3150
Untrusted search path vulnerability in Adobe Premier Pro CS4 4.0.0 (314 (MC: 160820)) allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as a .pproj, .prfp...
Adobe Premier Pro Cs4 4.0.0 \\(314\\(mc\\
1 EDB exploit
9.3
CVSSv2
CVE-2010-3151
Untrusted search path vulnerability in Adobe On Location CS4 Build 315 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an OLPROJ file.
Adobe Onlocation Cs4 4.0.1
Adobe Onlocation Cs4 4.0.2
Adobe Onlocation Cs4 4.0.3
1 EDB exploit
9.3
CVSSv2
CVE-2010-3152
Untrusted search path vulnerability in Adobe Illustrator CS4 14.0.0, CS5 15.0.1 and previous versions, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or aires...
Adobe Illustrator 15.0.1
Adobe Illustrator 14.0
1 EDB exploit
9.3
CVSSv2
CVE-2010-3153
Untrusted search path vulnerability in Adobe InDesign CS4 6.0, InDesign CS5 7.0.2 and previous versions, Adobe InDesign Server CS5 7.0.2 and previous versions, and Adobe InCopy CS5 7.0.2 and previous versions allows local users, and possibly remote attackers, to execute arbitrary...
Adobe Indesign Cs4 6.0
1 EDB exploit
7.2
CVSSv2
CVE-2014-5507
iBackup 10.0.0.32 and previous versions uses weak permissions (Everyone: Full Control) for ib_service.exe, which allows local users to gain privileges via a Trojan horse file.
Pro Softnet Corporation Ibackup
1 EDB exploit
4.3
CVSSv2
CVE-2015-0624
The web framework in Cisco AsyncOS on Email Security Appliance (ESA), Content Security Management Appliance (SMA), and Web Security Appliance (WSA) devices allows remote malicious users to trigger redirects via a crafted HTTP header, aka Bug IDs CSCur44412, CSCur44415, CSCur89630...
Cisco Email Security Appliance Firmware -
Cisco Content Security Management Appliance -
Cisco Web Security Appliance -
9.3
CVSSv2
CVE-2010-3128
Untrusted search path vulnerability in TeamViewer 5.0.8703 and previous versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .tvs or .tvc file.
Teamviewer Teamviewer
Teamviewer Teamviewer 4.1.8107
Teamviewer Teamviewer 3.6.5523
Teamviewer Teamviewer 2.44
Teamviewer Teamviewer 1.85
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »