Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
coresecurity.com vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-04403
Core Security Technologies Advisory - The Cisco Secure Desktop web application does not sufficiently verify if a well-formed request was provided by the user who submitted the POST request, resulting in a cross-site scripting vulnerability. In order to be able to successfully mak...
231
VMScore
CVE-2006-5793
The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 up to and including 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent malicious users to cause a denial of service (crash) via malformed sPLT chunks that trigger an...
Greg Roelofs Libpng 1.0.9
Greg Roelofs Libpng 1.2.0
Greg Roelofs Libpng 1.2.5
Greg Roelofs Libpng 1.2.6
Greg Roelofs Libpng 1.0.7
Greg Roelofs Libpng 1.0.8
Greg Roelofs Libpng 1.2.3
Greg Roelofs Libpng 1.2.4
Greg Roelofs Libpng 1.0.6
Greg Roelofs Libpng 1.2.12
Greg Roelofs Libpng 1.2.2
Greg Roelofs Libpng 1.2.8
Greg Roelofs Libpng 1.2.9
Greg Roelofs Libpng 1.2.1
Greg Roelofs Libpng 1.2.10
Greg Roelofs Libpng 1.2.11
Greg Roelofs Libpng 1.2.7
Greg Roelofs Libpng 1.2.7rc1
NA
CVE-2009-35773
Core Security Technologies Advisory - Autodesk 3DS Max Application Callbacks suffers from an arbitrary command execution vulnerability.
NA
CVE-2009-35783
Core Security Technologies Advisory - Autodesk Maya Script Nodes suffers from an arbitrary command execution vulnerability.
NA
CVE-2009-38503
Core Security Technologies Advisory - Blender embeds a python interpreter to extend its functionality. Blender .blend project files can be modified to execute arbitrary commands without user intervention by design. An attacker can take full control of the machine where Blender is...
578
VMScore
CVE-2018-10168
TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows do not control privileges for usage of the Web API, allowing a low-privilege user to make any request as an Administrator. This is fixed in version 2.6.1_Windows.
Tp-link Eap Controller 2.5.4
Tp-link Eap Controller 2.6.0
NA
CVE-2013-25713
Core Security Technologies Advisory - A security vulnerability was found in Xpient POS systems running an instance of Iris 3.8 software. The POS cash drawer could be remotely triggered to open if a malicious agent has access to the POS network and is allowed to send a crafted mes...
NA
CVE-2009-35763
Core Security Technologies Advisory - Autodesk SoftImage Scene TOC suffers from an arbitrary command execution vulnerability.
NA
CVE-2009-11403
Core Security Technologies Advisory - Internet Explorer suffers from a security zone restrictions bypass vulnerability.
NA
CVE-2009-41483
Core Security Technologies Advisory - DAZ Studio is a 3D figure illustration/animation application released by DAZ 3D Inc. DAZ Studio can be accessed via a scripting language which allows for quite a bit of diversity in tool creation. DAZ Studio does not ask for any confirmation ...
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »