Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft powershell core 6.1 vulnerabilities and exploits
(subscribe to this query)
4.1
CVSSv3
CVE-2019-1167
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an malicious user to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'.
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.2
7.5
CVSSv3
CVE-2019-1301
A denial of service vulnerability exists when .NET Core improperly handles web requests, aka '.NET Core Denial of Service Vulnerability'.
Microsoft Powershell Core 6.2
Microsoft .net Core 2.1
Microsoft .net Core 2.2
Microsoft Powershell Core 6.1
2 Github repositories
1 Article
5.5
CVSSv3
CVE-2018-8356
A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates, aka ".NET Framework Security Feature Bypass Vulnerability." This affects .NET Framework 4.7.2, Microsoft .NET Framework 3.0, Microsoft .NET Fr...
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft .net Core 2.0
Microsoft .net Core 1.0
Microsoft .net Core 1.1
Microsoft .net Framework Developer Pack 4.7.2
Microsoft Asp.net Core 1.0
Microsoft Asp.net Core 1.1
Microsoft Asp.net Core 2.0
5.9
CVSSv3
CVE-2019-0657
A vulnerability exists in certain .Net Framework API's and Visual Studio in the way they parse URL's, aka '.NET Framework and Visual Studio Spoofing Vulnerability'.
Microsoft .net Core 1.0
Microsoft .net Core 2.1
Microsoft .net Core 2.2
Microsoft Visual Studio 2017 -
Microsoft Visual Studio 2017 15.9
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.0
Microsoft .net Framework 2.0
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
1 Article
7.8
CVSSv3
CVE-2019-0627
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0631, CVE-2019-0632.
Microsoft Windows 10 -
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1803
Microsoft Windows 10 1703
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2016 -
Microsoft Windows 10 1809
Microsoft Powershell Core 6.2
Microsoft Windows 10 1709
Microsoft Windows 10 1607
1 Article
7.8
CVSSv3
CVE-2019-0631
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0632.
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2016 -
Microsoft Windows 10 1809
Microsoft Windows 10 1803
Microsoft Powershell Core 6.2
Microsoft Windows Server 2016 1709
Microsoft Windows 10 1709
Microsoft Windows 10 1607
Microsoft Powershell Core 6.1
Microsoft Windows Server 2019 -
Microsoft Windows 10 1703
Microsoft Windows 10 -
1 Article
7.8
CVSSv3
CVE-2019-0632
A security feature bypass vulnerability exists in Windows which could allow an malicious user to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0631.
Microsoft Windows 10 1803
Microsoft Windows 10 1709
Microsoft Windows 10 1703
Microsoft Windows 10 1607
Microsoft Windows Server 2016 1803
Microsoft Windows 10 1809
Microsoft Windows 10 -
Microsoft Powershell Core 6.1
Microsoft Powershell Core 6.2
Microsoft Windows Server 2019 -
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 -
1 Article
7.8
CVSSv3
CVE-2018-8415
A tampering vulnerability exists in PowerShell that could allow an malicious user to execute unlogged code, aka "Microsoft PowerShell Tampering Vulnerability." This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Wind...
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 10 -
Microsoft Windows 10 1607
Microsoft Windows 10 1703
Microsoft Windows 10 1709
Microsoft Powershell Core 6.0
Microsoft Windows 10 1809
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2016 1803
Microsoft Powershell Core 6.1
Microsoft Windows 10 1803
Microsoft Windows 7 -
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2019 -
8.8
CVSSv3
CVE-2018-8256
A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka "Microsoft PowerShell Remote Code Execution Vulnerability." This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Serve...
Microsoft Powershell Core 6.0
Microsoft Powershell Core 6.1
Microsoft Windows 10 -
Microsoft Windows 10 1607
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2019 -
Microsoft Windows 7 -
Microsoft Windows 8.1 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1709
Microsoft Windows 10 1809
Microsoft Windows Server 2012 R2
Microsoft Microsoft.powershell.archive 1.2.2.0
Microsoft Windows 10 1703
Microsoft Windows 10 1803
Microsoft Windows Server 2012 -
Microsoft Windows Server 2016 -
6.1
CVSSv3
CVE-2019-11358
jQuery prior to 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Jquery Jquery
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Drupal Drupal
Backdropcms Backdrop
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Netapp Snapcenter -
Netapp Oncommand System Manager
Redhat Cloudforms 4.7
Redhat Virtualization Manager 4.3
Oracle Service Bus 12.1.3.0.0
Oracle Primavera Unifier 16.2
Oracle Jd Edwards Enterpriseone Tools 9.2
Oracle Weblogic Server 12.1.3.0.0
Oracle Service Bus 11.1.1.9.0
Oracle Jdeveloper 11.1.1.9.0
Oracle Primavera Unifier 16.1
98 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started