Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft azure security center vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-3094
Malicious code exists in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific fun...
Tukaani Xz 5.6.1
Tukaani Xz 5.6.0
77 Github repositories
6 Articles
NA
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Ietf Http 2.0
Nghttp2 Nghttp2
Netty Netty
Envoyproxy Envoy 1.27.0
Envoyproxy Envoy 1.26.4
Envoyproxy Envoy 1.25.9
Envoyproxy Envoy 1.24.10
Eclipse Jetty
Caddyserver Caddy
Golang Http2
Golang Go
Golang Networking
F5 Big-ip Analytics
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Global Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Domain Name System
F5 Big-ip Application Security Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager
34 Github repositories
2 Articles
4.6
CVSSv2
CVE-2022-29149
Azure Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
Microsoft Azure Automation State Configuration -
Microsoft Azure Automation Update Management -
Microsoft Container Monitoring Solution -
Microsoft Log Analytics Agent -
Microsoft System Center Operations Manager 2016
Microsoft System Center Operations Manager 2019
Microsoft System Center Operations Manager 2022
Microsoft Azure Security Center
Microsoft Azure Sentinel
Microsoft Azure Stack Hub
Microsoft Azure Diagnostics
Microsoft Open Management Infrastructure
4.6
CVSSv2
CVE-2021-38645
Open Management Infrastructure Elevation of Privilege Vulnerability
Microsoft System Center Operations Manager -
Microsoft Azure Automation State Configuration -
Microsoft Azure Automation Update Management -
Microsoft Azure Diagnostics \\(lad\\) -
Microsoft Azure Open Management Infrastructure -
Microsoft Azure Security Center -
Microsoft Azure Sentinel -
Microsoft Azure Stack Hub -
Microsoft Container Monitoring Solution -
Microsoft Log Analytics Agent -
3 Github repositories
7.5
CVSSv2
CVE-2021-38647
Open Management Infrastructure Remote Code Execution Vulnerability
Microsoft System Center Operations Manager -
Microsoft Azure Automation State Configuration -
Microsoft Azure Automation Update Management -
Microsoft Azure Diagnostics \\(lad\\) -
Microsoft Azure Open Management Infrastructure -
Microsoft Azure Security Center -
Microsoft Azure Sentinel -
Microsoft Azure Stack Hub -
Microsoft Container Monitoring Solution -
Microsoft Log Analytics Agent -
22 Github repositories
2 Articles
4.6
CVSSv2
CVE-2021-38649
Open Management Infrastructure Elevation of Privilege Vulnerability
Microsoft System Center Operations Manager -
Microsoft Azure Automation State Configuration -
Microsoft Azure Automation Update Management -
Microsoft Azure Diagnostics \\(lad\\) -
Microsoft Azure Open Management Infrastructure -
Microsoft Azure Security Center -
Microsoft Azure Sentinel -
Microsoft Azure Stack Hub -
Microsoft Container Monitoring Solution -
Microsoft Log Analytics Agent -
2 Github repositories
4.6
CVSSv2
CVE-2021-38648
Open Management Infrastructure Elevation of Privilege Vulnerability
Microsoft System Center Operations Manager -
Microsoft Azure Automation State Configuration -
Microsoft Azure Automation Update Management -
Microsoft Azure Diagnostics \\(lad\\) -
Microsoft Azure Open Management Infrastructure -
Microsoft Azure Security Center -
Microsoft Azure Sentinel -
Microsoft Azure Stack Hub -
Microsoft Container Monitoring Solution -
Microsoft Log Analytics Agent -
2 Github repositories
4.8
CVSSv2
CVE-2019-9506
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffi...
Google Android -
Apple Mac Os X 10.12.6
Apple Mac Os X 10.14.5
Apple Watchos 5.3
Apple Iphone Os 12.4
Apple Mac Os X 10.13.6
Apple Tvos 12.4
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Debian Debian Linux 8.0
Opensuse Leap 15.0
Opensuse Leap 15.1
Redhat Mrg Realtime 2.0
Redhat Virtualization Host Eus 4.2
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Aus 7.5
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Eus 8.4
5 Github repositories
2 Articles
1.9
CVSSv2
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
47 Github repositories
9 Articles
4.7
CVSSv2
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
42 Github repositories
9 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5274
CVE-2024-35388
CVE-2024-35396
elevation of privilege
CVE-2021-47544
file upload
CVE-2021-47545
memory leak
CVE-2024-4956
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »