Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
charalambous glafkos vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2015-2291
(1) IQVW32.sys prior to 1.3.1.0 and (2) IQVW64.sys prior to 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8...
Intel Ethernet Diagnostics Driver Iqvw32.sys 1.03.0.7
Intel Ethernet Diagnostics Driver Iqvw64.sys 1.03.0.7
1 EDB exploit
3 Github repositories
NA
CVE-2015-0624
The web framework in Cisco AsyncOS on Email Security Appliance (ESA), Content Security Management Appliance (SMA), and Web Security Appliance (WSA) devices allows remote malicious users to trigger redirects via a crafted HTTP header, aka Bug IDs CSCur44412, CSCur44415, CSCur89630...
Cisco Email Security Appliance Firmware -
Cisco Content Security Management Appliance -
Cisco Web Security Appliance -
NA
CVE-2014-5507
iBackup 10.0.0.32 and previous versions uses weak permissions (Everyone: Full Control) for ib_service.exe, which allows local users to gain privileges via a Trojan horse file.
Pro Softnet Corporation Ibackup
1 EDB exploit
NA
CVE-2013-6780
Cross-site scripting (XSS) vulnerability in uploader.swf in the Uploader component in Yahoo! YUI 2.5.0 up to and including 2.9.0 allows remote malicious users to inject arbitrary web script or HTML via the allowedDomain parameter.
Yahoo Yui 2.5.0
Yahoo Yui 2.5.1
Yahoo Yui 2.8.2
Yahoo Yui 2.9.0
Yahoo Yui 2.6.0
Yahoo Yui 2.8.0
Yahoo Yui 2.5.2
Yahoo Yui 2.7.0
Yahoo Yui 2.8.1
NA
CVE-2013-5321
Multiple SQL injection vulnerabilities in AlienVault Open Source Security Information Management (OSSIM) 4.1 allow remote malicious users to execute arbitrary SQL commands via the (1) sensor parameter in a Query action to forensics/base_qry_main.php; the (2) tcp_flags[] or (3) tc...
Alienvault Open Source Security Information Management 4.1
1 EDB exploit
NA
CVE-2010-3153
Untrusted search path vulnerability in Adobe InDesign CS4 6.0, InDesign CS5 7.0.2 and previous versions, Adobe InDesign Server CS5 7.0.2 and previous versions, and Adobe InCopy CS5 7.0.2 and previous versions allows local users, and possibly remote attackers, to execute arbitrary...
Adobe Indesign Cs4 6.0
1 EDB exploit
NA
CVE-2010-3149
Untrusted search path vulnerability in Adobe Device Central CS5 3.0.0(376), 3.0.1.0 (3027), and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse qtcf.dll that is located in th...
Adobe Device Central Cs5 3.0.0\\(376\\)
1 EDB exploit
NA
CVE-2010-3150
Untrusted search path vulnerability in Adobe Premier Pro CS4 4.0.0 (314 (MC: 160820)) allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as a .pproj, .prfp...
Adobe Premier Pro Cs4 4.0.0 \\(314\\(mc\\
1 EDB exploit
NA
CVE-2010-3151
Untrusted search path vulnerability in Adobe On Location CS4 Build 315 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an OLPROJ file.
Adobe Onlocation Cs4 4.0.1
Adobe Onlocation Cs4 4.0.2
Adobe Onlocation Cs4 4.0.3
1 EDB exploit
NA
CVE-2010-3152
Untrusted search path vulnerability in Adobe Illustrator CS4 14.0.0, CS5 15.0.1 and previous versions, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or aires...
Adobe Illustrator 15.0.1
Adobe Illustrator 14.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »