Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
overflow vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2012-3456
Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in Calligra 2.4.3 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code...
Calligra Calligra 2.4.2
Calligra Calligra
Calligra Calligra 2.4
Calligra Calligra 2.4.1
1 EDB exploit
2.1
CVSSv2
CVE-2008-7258
The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usabi...
Anibal Monsalve Salaz Ssmtp 2.61
Anibal Monsalve Salaz Ssmtp 2.62
1 EDB exploit
4
CVSSv2
CVE-2014-7221
TeamSpeak Client 3.0.14 and previous versions allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http...
Teamspeak Teamspeak3
1 EDB exploit
6.8
CVSSv2
CVE-2013-5680
Heap-based buffer overflow in hfaxd in HylaFAX+ 5.2.4 up to and including 5.5.3, when using LDAP authentication, might allow remote malicious users to cause a denial of service (child hang) or execute arbitrary code via a long USER command.
Lee Howard Hylafax\\+ 5.5.1
Lee Howard Hylafax\\+ 5.4.1
Lee Howard Hylafax\\+ 5.4.2
Lee Howard Hylafax\\+ 5.5.0
Lee Howard Hylafax\\+ 5.2.5
Lee Howard Hylafax\\+ 5.5.3
Lee Howard Hylafax\\+ 5.2.8
Lee Howard Hylafax\\+ 5.3.0
Lee Howard Hylafax\\+ 5.2.9
Lee Howard Hylafax\\+ 5.2.7
Lee Howard Hylafax\\+ 5.5.2
Lee Howard Hylafax\\+ 5.2.4
Lee Howard Hylafax\\+ 5.2.6
1 EDB exploit
7.5
CVSSv2
CVE-2000-0284
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
University Of Washington Imap 12.264
8 EDB exploits
6.8
CVSSv2
CVE-2018-9128
DVD X Player Standard 5.5.3.9 has a Buffer Overflow via a crafted .plf file, a related issue to CVE-2007-3068.
Dvd-x-player Dvd X Player 5.5.3.9
2 EDB exploits
7.5
CVSSv2
CVE-2006-6251
Stack-based buffer overflow in VUPlayer 2.44 and previous versions allows remote malicious users to execute arbitrary code via a long string in an M3U file, aka an "M3U UNC Name" attack.
Vuplayer Vuplayer
3 EDB exploits
9.3
CVSSv2
CVE-2009-0546
Stack-based buffer overflow in NewsGator FeedDemon 2.7 and previous versions allows user-assisted remote malicious users to execute arbitrary code via a long text attribute in an outline element in a .opml file.
Newsgator Feeddemon 2.0.0.24
Newsgator Feeddemon 2.6.1.4
Newsgator Feeddemon 2.6.1.5
Newsgator Feeddemon
Newsgator Feeddemon 2.6
4 EDB exploits
10
CVSSv2
CVE-2006-3838
Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) prior to 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and ...
Eiqnetworks Enterprise Security Analyzer
6 EDB exploits
10
CVSSv2
CVE-2008-5457
Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote malicious users to affect confidentiality, integrity, and availability via ...
Oracle Bea Product Suite 10.3
Oracle Bea Product Suite 10.0
Oracle Bea Product Suite 9.2
Oracle Bea Product Suite 8.1
Oracle Bea Product Suite 7.0
Oracle Bea Product Suite 9.1
Oracle Bea Product Suite 9.0
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-2907
hardcoded
inject
CVE-2024-20359
CVE-2024-2467
CVE-2024-4077
CVE-2024-22391
camera
CVE-2024-20353
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »