Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
leads vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2021-21477
SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution...
Sap Commerce 1808
Sap Commerce 1811
Sap Commerce 1905
Sap Commerce 2005
Sap Commerce 2011
1 Article
9.3
CVSSv2
CVE-2020-13958
A vulnerability in Apache OpenOffice scripting events allows an malicious user to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be ...
Apache Openoffice
1 Github repository
6.8
CVSSv2
CVE-2016-5637
The restore_tqb_pixels function in libbpg 0.9.5 up to and including 0.9.7 mishandles the transquant_bypass_enable_flag value, which allows remote malicious users to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted BPG image, related to a &qu...
Libbpg Project Libbpg
7.2
CVSSv2
CVE-2021-32606
In the Linux kernel 5.11 up to and including 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
Linux Linux Kernel
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
NA
CVE-2024-4340
sqlparse: CVE-2024-4340: sqlparse parsing heavily nested list leads to Denial of Service
7.5
CVSSv2
CVE-2021-26701
.NET Core Remote Code Execution Vulnerability
Microsoft Visual Studio 2019 -
Microsoft Visual Studio 2019
Microsoft .net Core
Microsoft Powershell Core 7.0
Microsoft Powershell Core 7.1
Microsoft .net
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
1 Article
4.3
CVSSv2
CVE-2010-4489
libvpx, as used in Google Chrome prior to 8.0.552.215 and possibly other products, allows remote malicious users to cause a denial of service (out-of-bounds read) via a crafted WebM video. NOTE: this vulnerability exists because of a regression.
Google Chrome
6.9
CVSSv2
CVE-2022-0017
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local malicious user to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges un...
Paloaltonetworks Globalprotect
4.3
CVSSv2
CVE-2017-2661
ClusterLabs pcs before version 0.9.157 is vulnerable to a cross-site scripting vulnerability due to improper validation of Node name field when creating new cluster or adding existing cluster.
Clusterlabs Pcs
NA
CVE-2024-3387
A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an malicious user to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages. With sufficient comput...
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2024-34413
CVE-2024-34089
CVE-2024-33408
local
SQL
CVE-2024-0402
CVE-2024-33910
CVE-2024-31848
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »