Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zeroscience.mk vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv3
CVE-2015-7714
Multiple SQL injection vulnerabilities in the Realtyna RPL (com_rpl) component prior to 8.9.5 for Joomla! allow remote administrators to execute arbitrary SQL commands via the (1) id, (2) copy_field in a data_copy action, (3) pshow in an update_field action, (4) css, (5) tip, (6)...
Realtyna Realtyna Property Listing
1 EDB exploit
7.5
CVSSv3
CVE-2015-2080
The exception handling code in Eclipse Jetty prior to 9.2.9.v20150224 allows remote malicious users to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
Fedoraproject Fedora 22
Eclipse Jetty 9.3.0
Eclipse Jetty 9.2.3
Eclipse Jetty 9.2.8
Eclipse Jetty 9.2.5
Eclipse Jetty 9.2.4
Eclipse Jetty 9.2.7
Eclipse Jetty 9.2.6
1 EDB exploit
NA
CVE-2012-0677
Heap-based buffer overflow in Apple iTunes prior to 10.6.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted .m3u playlist.
Apple Itunes 10.3
Apple Itunes 10.2
Apple Itunes 10.4
Apple Itunes 10.4.0.80
Apple Itunes 10.1
Apple Itunes 10.1.1
Apple Itunes 10.1.1.4
Apple Itunes 10.5.1
Apple Itunes 10.5.1.42
Apple Itunes 10.3.1
Apple Itunes 10.4.1.10
Apple Itunes 10.5.2
Apple Itunes 10.0
Apple Itunes 10.0.1
Apple Itunes 10.2.2.12
Apple Itunes 10.5
Apple Itunes 10.5.3
Apple Itunes 10.4.1
Apple Itunes 10.6
Apple Itunes 10.1.2
Apple Itunes
2 EDB exploits
NA
CVE-2006-6251
Stack-based buffer overflow in VUPlayer 2.44 and previous versions allows remote malicious users to execute arbitrary code via a long string in an M3U file, aka an "M3U UNC Name" attack.
Vuplayer Vuplayer
3 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5