Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2018-14878
JetBrains dotPeek prior to 2018.2 and ReSharper Ultimate prior to 2018.1.4 allow malicious users to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific file, because of Deserialization of Untrusted Data.
Jetbrains Dotpeek
Jetbrains Resharper Ultimate
7.2
CVSSv2
CVE-2018-1488
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5 and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local malicious user to execute arbitrary code on the system as root. IBM X-Force ID: 140973.
Ibm Db2 10.5
Ibm Db2 11.1
4.3
CVSSv2
CVE-2022-2218
Cross-site Scripting (XSS) - Stored in GitHub repository ionicabizau/parse-url before 7.0.0.
Parse-url Project Parse-url
1 Github repository
3.5
CVSSv2
CVE-2022-22181
A reflected Cross-site Scripting (XSS) vulnerability in J-Web of Juniper Networks Junos OS allows a network-based authenticated malicious user to run malicious scripts reflected off J-Web to the victim's browser in the context of their session within J-Web. This may allow th...
Juniper Junos
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
4.6
CVSSv2
CVE-2020-0486
In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for e...
Google Android 11.0
5
CVSSv2
CVE-2022-22185
A vulnerability in Juniper Networks Junos OS on SRX Series, allows a network-based unauthenticated malicious user to cause a Denial of Service (DoS) by sending a specific fragmented packet to the device, resulting in a flowd process crash, which is responsible for packet forwardi...
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
7.2
CVSSv2
CVE-2022-22187
An Improper Privilege Management vulnerability in the Windows Installer framework used in the Juniper Networks Juniper Identity Management Service (JIMS) allows an unprivileged user to trigger a repair operation. Running a repair operation, in turn, will trigger a number of file ...
Juniper Identity Management Service
7.2
CVSSv2
CVE-2022-22189
An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. T...
Juniper Contrail Service Orchestration 6.0.0
4.6
CVSSv2
CVE-2020-0513
Out of bounds write for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Graphics Drivers
2.1
CVSSv2
CVE-2020-0518
Improper access control in the Intel(R) HD Graphics Control Panel before version 15.40.46.5144 and 15.36.39.5143 may allow an authenticated user to potentially enable denial of service via local access.
Intel Graphics Drivers
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »