By Risk Score
By Publish Date
By Recent Activity
cve-2020-6193 vulnerabilities and exploits
Mozilla Thunderbird could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read when processing an email message with an ill-formed envelope. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this...
Mozilla Thunderbird could allow a remote attacker to bypass security restrictions, caused by the use of uninitialized memory in addition to the message contents when deriving an identifier for an email message. By persuading a victim to visit a specially-crafted Web site, a...
ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check data types, which might allow remote attackers to obtain sensitive information by using a (1) string or (2) array data type in place of a numeric data type, as demonstrated by an imagecrop function call with a string for the x...
Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a...
2 Github repositories available
1 Article available
Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.130 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted Chrome Extension....
Use after free in V8 in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page....
Use after free in speech in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page....
Unspecified vulnerability in HP Operations Agent before 11.03.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1326....
1 EDB exploit available
1 Metasploit module available
Sam Crew MyBlog stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information....
1 EDB exploit available
Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file....
Fine Free File Project
Fine Free File
NULL pointer dereference