Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
monero vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2020-6861
A flawed protocol design in the Ledger Monero app prior to 1.5.1 for Ledger Nano and Ledger S devices allows a local malicious user to extract the master spending key by sending crafted messages to this app selected on a PIN-entered Ledger connected to a host PC.
Ledger Monero
1 Github repository
4.6
CVSSv2
CVE-2020-26947
monero-wallet-gui in Monero GUI prior to 0.17.1.0 includes the . directory in an embedded RPATH (with a preference ahead of /usr/lib), which allows local users to gain privileges via a Trojan horse library in the current working directory.
Getmonero Monero
7.5
CVSSv2
CVE-2018-3972
An exploitable code execution vulnerability exists in the Levin deserialization functionality of the Epee library, as used in Monero 'Lithium Luna' (v0.12.2.0-master-ffab6700) and other cryptocurrencies. A specially crafted network packet can cause a logic flaw, resulti...
Getmonero Monero 0.12.2.0
5 Github repositories
7.5
CVSSv2
CVE-2017-1000353
Jenkins versions 2.56 and previous versions as well as 2.46.1 LTS and previous versions are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed malicious users to transfer a serialized Java `SignedObject` object t...
Jenkins Jenkins
Oracle Communications Cloud Native Core Automated Test Suite 1.9.0
1 EDB exploit
5 Github repositories
1 Article
6.8
CVSSv2
CVE-2022-22947
In spring cloud gateway versions before 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote ex...
Vmware Spring Cloud Gateway 3.1.0
Vmware Spring Cloud Gateway
Oracle Commerce Guided Search 11.3.2
Oracle Communications Cloud Native Core Network Slice Selection Function 1.8.0
Oracle Communications Cloud Native Core Network Slice Selection Function 22.1.0
Oracle Communications Cloud Native Core Network Repository Function 1.15.0
Oracle Communications Cloud Native Core Network Function Cloud Native Environment 1.10.0
Oracle Communications Cloud Native Core Network Exposure Function 22.1.0
Oracle Communications Cloud Native Core Service Communication Proxy 1.15.0
Oracle Communications Cloud Native Core Network Repository Function 1.15.1
Oracle Communications Cloud Native Core Binding Support Function 1.11.0
Oracle Communications Cloud Native Core Binding Support Function 22.1.3
Oracle Communications Cloud Native Core Network Repository Function 22.2.0
Oracle Communications Cloud Native Core Security Edge Protection Proxy 22.1.1
Oracle Communications Cloud Native Core Console 22.2.0
Oracle Communications Cloud Native Core Network Repository Function 22.1.2
72 Github repositories
2 Articles
4.6
CVSSv2
CVE-2019-2215
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerabi...
Google Android -
2 EDB exploits
31 Github repositories
2 Articles
4.9
CVSSv2
CVE-2018-12207
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
Intel Core I3-10110u Firmware -
Intel Core I3-10110y Firmware -
Intel Core I3-1005g1 Firmware -
Intel Core I3-9300t Firmware -
Intel Core I3-9300 Firmware -
Intel Core I3-9100 Firmware -
Intel Core I3-9100t Firmware -
Intel Core I3-9350k Firmware -
Intel Core I3-9320 Firmware -
Intel Core I3-8145u Firmware -
Intel Core I3-8300 Firmware -
Intel Core I3-8100t Firmware -
Intel Core I3-8300t Firmware -
Intel Core I3-8109u Firmware -
Intel Core I3-8130u Firmware -
Intel Core I3-8100 Firmware -
Intel Core I3-8350k Firmware -
Intel Core I3-7100 Firmware -
Intel Core I3-7350k Firmware -
Intel Core I3-7300t Firmware -
Intel Core I3-7167u Firmware -
Intel Core I3-7300 Firmware -
3 Github repositories
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32744
privilege escalation
CVE-2024-30253
CVE-2024-3914
cross-site scripting
CVE-2024-31497
CVE-2024-3400
CVE-2024-32341
hardcoded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started