Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
type confusion vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2017-8634
Microsoft Edge in Microsoft Windows 10 1703 allows an malicious user to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption ...
Microsoft Edge -
1 EDB exploit
8.8
CVSSv3
CVE-2022-4906
Inappropriate implementation in Blink in Google Chrome before 108.0.5359.71 allowed a remote malicious user to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
Google Chrome
7.8
CVSSv3
CVE-2023-21665
Memory corruption in Graphics while importing a file.
Qualcomm 315 5g Iot Modem Firmware -
Qualcomm 9206 Lte Modem Firmware -
Qualcomm Apq8017 Firmware -
Qualcomm Apq8052 Firmware -
Qualcomm Apq8056 Firmware -
Qualcomm Apq8064au Firmware -
Qualcomm Apq8076 Firmware -
Qualcomm Aqt1000 Firmware -
Qualcomm Ar8031 Firmware -
Qualcomm Ar8035 Firmware -
Qualcomm C-v2x 9150 Firmware -
Qualcomm Csra6620 Firmware -
Qualcomm Csra6640 Firmware -
Qualcomm Csrb31024 Firmware -
Qualcomm Wcn3998 Firmware -
Qualcomm Wcn6750 Firmware -
Qualcomm Qca6390 Firmware -
Qualcomm Wcn685x-5 Firmware -
Qualcomm Wcn685x-1 Firmware -
Qualcomm Flight Rb5 5g Platform Firmware -
Qualcomm Qca-4020-0-217msp Firmware -
Qualcomm Qca-4020-1-217msp Firmware -
8.8
CVSSv3
CVE-2017-7005
An issue exists in certain Apple products. iOS prior to 10.3.2 is affected. Safari prior to 10.1.1 is affected. tvOS prior to 10.2.1 is affected. The issue involves the "JavaScriptCore" component. It allows remote malicious users to execute arbitrary code or cause a den...
Apple Safari
Apple Tvos
Apple Iphone Os
1 EDB exploit
2 Github repositories
8.8
CVSSv3
CVE-2023-2936
Type Confusion in V8 in Google Chrome before 114.0.5735.90 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
7.5
CVSSv3
CVE-2016-7287
The scripting engines in Microsoft Internet Explorer 11 and Microsoft Edge allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
Microsoft Edge -
Microsoft Internet Explorer 11
1 EDB exploit
NA
CVE-2015-2469
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, and Office for Mac 2011 allow remote malicious users to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
Microsoft Office 2011
Microsoft Word 2007
Microsoft Word 2010
Microsoft Office 2010
1 EDB exploit
NA
CVE-2021-30745
This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Qua...
7.5
CVSSv3
CVE-2016-7201
The Chakra JavaScript scripting engine in Microsoft Edge allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability th...
Microsoft Edge
2 EDB exploits
4 Github repositories
1 Article
7.5
CVSSv3
CVE-2017-8618
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 Internet Explorer in the way affected Microsoft scripting engines render when handl...
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27975
CVE-2024-2961
CVE-2024-20380
XML injection
HTML injection
CVE-2024-29204
CVE-2023-51795
memory leak
CVE-2024-3470
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »