Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
shell vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2003-1119
SSH Secure Shell prior to 3.2.9 allows remote malicious users to cause a denial of service via malformed BER/DER packets.
Ssh Secure Shell 3.1
Ssh Secure Shell 3.2
NA
CVE-2023-43090
A vulnerability was found in GNOME Shell. GNOME Shell's lock screen allows an unauthenticated local user to view windows of the locked desktop session by using keyboard shortcuts to unlock the restricted functionality of the screenshot tool.
Gnome Gnome-shell
Gnome Gnome-shell 42
Fedoraproject Fedora 37
Fedoraproject Fedora 38
312
VMScore
CVE-2021-27217
An issue exists in the _send_secure_msg() function of Yubico yubihsm-shell up to and including 2.0.3. The function does not correctly validate the embedded length field of an authenticated message received from the device. Out-of-bounds reads performed by aes_remove_padding() can...
Yubico Yubihsm-shell
187
VMScore
CVE-2021-3982
Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler prior...
Gnome Gnome-shell -
NA
CVE-2022-21535
Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: General/Core Client). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Shell execu...
Oracle Mysql Shell
NA
CVE-2022-21555
Vulnerability in the MySQL Shell for VS Code product of Oracle MySQL (component: Shell: GUI). Supported versions that are affected are 1.1.8 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Shell for VS Code ...
Oracle Mysql Shell
605
VMScore
CVE-2013-4581
GitLab 5.0 prior to 5.4.2, Community Edition prior to 6.2.4, Enterprise Edition prior to 6.2.1 and gitlab-shell prior to 1.7.8 allows remote malicious users to execute arbitrary code via a crafted change using SSH.
Gitlab Gitlab 3.1.0
Gitlab Gitlab 3.0.3
Gitlab Gitlab 3.0.2
Gitlab Gitlab 3.0.1
Gitlab Gitlab 2.1.0
Gitlab Gitlab 2.0.0
Gitlab Gitlab 1.2.2
Gitlab Gitlab 1.2.1
Gitlab Gitlab 1.2.0
Gitlab Gitlab 6.1.0
Gitlab Gitlab 6.0.0
Gitlab Gitlab 5.4.1
Gitlab Gitlab 5.0.1
Gitlab Gitlab 4.2.0
Gitlab Gitlab 4.0.0
Gitlab Gitlab 3.0.0
Gitlab Gitlab 2.9.0
Gitlab Gitlab 2.3.1
Gitlab Gitlab 2.2.0
Gitlab Gitlab 1.0.2
Gitlab Gitlab 1.0.0
Gitlab Gitlab
641
VMScore
CVE-1999-1541
shell-lock in Cactus Software Shell Lock allows local users to read or modify decoded shell files before they are executed, via a symlink attack on a temporary file.
Cactus Software Shell-lock
725
VMScore
CVE-2001-0553
SSH Secure Shell 3.0.0 on Unix systems does not properly perform password authentication to the sshd2 daemon, which allows local users to gain access to accounts with short password fields, such as locked accounts that use "NP" in the password field.
Ssh Secure Shell 3.0.0
1 EDB exploit
605
VMScore
CVE-2012-4427
The gnome-shell plugin 3.4.1 in GNOME allows remote malicious users to force the download and installation of arbitrary extensions from extensions.gnome.org via a crafted web page.
Gnome Gnome-shell 3.4.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »