Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
core security technologies vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-5267
Off-by-one error in ICC profile chunk handling in the png_set_iCCP function in pngset.c in libpng prior to 1.2.22 beta1 allows remote malicious users to cause a denial of service (crash) via a crafted PNG image, due to an incorrect fix for CVE-2007-5266.
Libpng Libpng
NA
CVE-2007-4901
The embedded Internet Explorer server control in AOL Instant Messenger (AIM) 6.1.41.2 and 6.2.32.1, AIM Pro, and AIM Lite does not properly constrain the use of mshtml.dll's web script and HTML functionality for incoming instant messages, which allows remote malicious users ...
Aol Aim Pro
Aol Instant Messenger 6.2.32.1
Aol Aim Lite
NA
CVE-2008-2080
Stack-based buffer overflow in the Read32s_64 function in src/lib/cdfread64.c in the NASA Goddard Space Flight Center Common Data Format (CDF) library prior to 3.2.1 allows context-dependent malicious users to execute arbitrary code via a .cdf file with crafted length tags.
Nasa Goddard Space Flight Center Common Data Format 2.2
Nasa Goddard Space Flight Center Common Data Format 2.3
Nasa Goddard Space Flight Center Common Data Format 2.0
Nasa Goddard Space Flight Center Common Data Format 2.1
Nasa Goddard Space Flight Center Common Data Format 3.0
Nasa Goddard Space Flight Center Common Data Format 3.1
Nasa Goddard Space Flight Center Common Data Format 2.4
Nasa Goddard Space Flight Center Common Data Format 2.5
Nasa Goddard Space Flight Center Common Data Format 2.6
Nasa Goddard Space Flight Center Common Data Format 2.7
Nasa Goddard Space Flight Center Common Data Format
NA
CVE-2011-06153
Core Security Technologies Advisory - Adobe Audition is vulnerable to numerous buffer overflows while parsing several fields inside the TRKM chunk on session (.ses) files. Then, a memory corruption can be leveraged to execute arbitrary code on vulnerable systems by enticing users...
NA
CVE-2007-5266
Off-by-one error in ICC profile chunk handling in the png_set_iCCP function in pngset.c in libpng prior to 1.0.29 beta1 and 1.2.x prior to 1.2.21 beta1 allows remote malicious users to cause a denial of service (crash) via a crafted PNG image that prevents a name field from being...
Libpng Libpng
NA
CVE-2010-03693
Core Security Technologies Advisory - A security vulnerability was discovered in LANDesk Management Suite: a cross-site request forgery which allows an external remote attacker to make a command injection that can be used to execute arbitrary code using the webserver user. As a r...
NA
CVE-2010-07663
Core Security Technologies Advisory - Luxology Modo 401 suffers from an integer overflow vulnerability when parsing .LXO files.
NA
CVE-2008-0923
Directory traversal vulnerability in the Shared Folders feature for VMWare ACE 1.0.2 and 2.0.2, Player 1.0.4 and 2.0.2, and Workstation 5.5.4 and 6.0.2 allows guest OS users to read and write arbitrary files on the host OS via a multibyte string that produces a wide character str...
Vmware Ace 2.0.1
Vmware Ace 2.0.2
Vmware Workstation 5.5.3 Build 34685
Vmware Workstation 5.5.4
Vmware Player 1.0.4
Vmware Vmware Player 1.0.1 Build 19317
Vmware Workstation 6.0
Vmware Ace 1.0.2
Vmware Ace 2.0
Vmware Vmware Workstation 6.0.2
Vmware Workstation 4.5.2
Vmware Ace 1.0
Vmware Vmware Player 1.0.2
Vmware Vmware Player 1.0.3
Vmware Vmware Workstation 6.0.1
1 Github repository
NA
CVE-2009-17293
Core Security Technologies Advisory - Several cross site scripting vulnerabilities were found in the following files/urls of the Sun Java System Communications Express system.
NA
CVE-2009-09493
Core Security Technologies Advisory - CUPS versions 1.3.9 and below suffer from a handling flaw of the IPP_TAG_UNSUPPORTED tag that allows attackers to cause a remote pre-authentication denial of service.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
CVE-2024-20360
CVE-2021-47559
XXE
CVE-2024-5229
CVE-2021-47543
CVE-2021-47571
SSTI
CVE-2024-4978
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »