Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
morgan vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-25921
All versions of package morgan-json are vulnerable to Arbitrary Code Execution due to missing sanitization of input passed to the Function constructor.
Morgan-json Project Morgan-json
9.8
CVSSv3
CVE-2020-13656
In Morgan Stanley Hobbes through 2020-05-21, the array implementation lacks bounds checking, allowing exploitation of an out-of-bounds (OOB) read/write vulnerability that leads to both local and remote code (via RPC) execution.
Morganstanley Hobbes
9.8
CVSSv3
CVE-2019-5413
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
Morgan Project Morgan
3 Github repositories
9.8
CVSSv3
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
9.6
CVSSv3
CVE-2021-21146
Use after free in Navigation in Google Chrome before 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
9.6
CVSSv3
CVE-2021-21142
Use after free in Payments in Google Chrome on Mac before 88.0.4324.146 allowed a remote malicious user to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
9.6
CVSSv3
CVE-2021-21124
Potential user after free in Speech Recognizer in Google Chrome on Android before 88.0.4324.96 allowed a remote malicious user to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Microsoft Edge Chromium
9.6
CVSSv3
CVE-2021-21121
Use after free in Omnibox in Google Chrome on Linux before 88.0.4324.96 allowed a remote malicious user to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Microsoft Edge Chromium
9.6
CVSSv3
CVE-2021-21132
Inappropriate implementation in DevTools in Google Chrome before 88.0.4324.96 allowed a remote malicious user to potentially perform a sandbox escape via a crafted Chrome Extension.
Google Chrome
Microsoft Edge Chromium
8.8
CVSSv3
CVE-2021-21144
Heap buffer overflow in Tab Groups in Google Chrome before 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »