Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bash vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-2943
Vulnerability in the Oracle Fusion Middleware MapViewer component of Oracle Fusion Middleware (subcomponent: Map Builder). Supported versions that are affected are 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via ...
Oracle Fusion Middleware Mapviewer 12.2.1.3.0
Oracle Fusion Middleware Mapviewer 12.2.1.2.0
1 Article
9.8
CVSSv3
CVE-2018-11228
Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices prior to 2.001.0037.001 allow unauthenticated remote code execution via a Bash shell service in Crestron Toolbox Protocol (CTP).
Crestron Crestron Toolbox Protocol Firmware
2 Github repositories
9.8
CVSSv3
CVE-2018-7739
antsle antman prior to 0.9.1a allows remote malicious users to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the /login URI. This allows obtaining root permissions within the web...
Antsle Antman
2 EDB exploits
9.8
CVSSv3
CVE-2017-8799
Untrusted input execution via igetwild in all iRODS versions prior to 4.1.11 and 4.2.1 allows other iRODS users (potentially anonymous) to execute remote shell commands via iRODS virtual pathnames. To exploit this vulnerability, a virtual iRODS pathname that includes a semicolon ...
Irods Irods
Irods Irods 4.2.0
9.8
CVSSv3
CVE-2016-10033
The mailSend function in the isMail transport in PHPMailer prior to 5.2.18 might allow remote malicious users to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Phpmailer Project Phpmailer
Wordpress Wordpress
Joomla Joomla\\!
9 EDB exploits
114 Github repositories
9.8
CVSSv3
CVE-2016-1329
Cisco NX-OS 6.0(2)U6(1) up to and including 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) up to and including 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote malicious users to obtain root privileges via a (1) TELNET or (2) SSH...
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(5\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(4\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(3\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(2\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(1\\\\\\)
Cisco Nx-ox 6.0\\\\\\(2\\\\\\)a7\\\\\\(1\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(1\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(5\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(4\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(3\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(2\\\\\\)
1 Article
9
CVSSv3
CVE-2021-45046
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with...
Apache Log4j 2.0
Apache Log4j
Intel Oneapi -
Intel Audio Development Kit -
Intel Datacenter Manager -
Intel System Debugger -
Intel Secure Device Onboard -
Intel Sensor Solution Firmware Development Kit -
Intel Computer Vision Annotation Tool -
Intel Genomics Kernel Library -
Intel System Studio -
Siemens Sppa-t3000 Ses3000 Firmware
Siemens Logo\\! Soft Comfort
Siemens Spectrum Power 4 4.70
Siemens Spectrum Power 4
Siemens Siveillance Control Pro
Siemens Energyip Prepay 3.7
Siemens Energyip Prepay 3.8
Siemens Siveillance Identity 1.6
Siemens Siveillance Identity 1.5
Siemens Siveillance Command
Siemens Sipass Integrated 2.85
193 Github repositories
9 Articles
8.8
CVSSv3
CVE-2023-52137
The [`tj-actions/verify-changed-files`](https://github.com/tj-actions/verify-changed-files) action allows for command injection in changed filenames, allowing an malicious user to execute arbitrary code and potentially leak secrets. The [`verify-changed-files`](https://github.com...
Tj-actions Verify-changed-files
8.8
CVSSv3
CVE-2023-30623
`embano1/wip` is a GitHub Action written in Bash. Prior to version 2, the `embano1/wip` action uses the `github.event.pull_request.title` parameter in an insecure way. The title parameter is used in a run statement - resulting in a command injection vulnerability due to string in...
Wip Project Wip
8.8
CVSSv3
CVE-2022-44794
An issue exists in Object First Ootbi BETA build 1.0.7.712. Management protocol has a flow which allows a remote malicious user to execute arbitrary Bash code with root privileges. The command that sets the hostname doesn't validate input parameters. As a result, arbitrary d...
Objectfirst Object First
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »