Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
abuse abuse vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-3067
Adobe Experience Manager Forms versions 6.2, 6.1, 6.0 have an information disclosure vulnerability resulting from abuse of the pre-population service in AEM Forms.
Adobe Experience Manager Forms 6.2
Adobe Experience Manager Forms 6.1
Adobe Experience Manager Forms 6.0
5
CVSSv2
CVE-2010-3667
TYPO3 prior to 4.1.14, 4.2.x prior to 4.2.13, 4.3.x prior to 4.3.4 and 4.4.x prior to 4.4.1 allows Spam Abuse in the native form content element.
Typo3 Typo3
NA
CVE-2023-2065
Authorization Bypass Through User-Controlled Key vulnerability in Armoli Technology Cargo Tracking System allows Authentication Abuse, Authentication Bypass.This issue affects Cargo Tracking System: prior to 3558f28 .
Armoli Cargo Tracking System
NA
CVE-2023-2702
Authorization Bypass Through User-Controlled Key vulnerability in Finex Media Competition Management System allows Authentication Abuse, Authentication Bypass.This issue affects Competition Management System: prior to 23.07.
Finexmedia Competition Management System
6.8
CVSSv2
CVE-2020-5736
Amcrest cameras and NVR are vulnerable to a null pointer dereference over port 37777. An authenticated remote attacker can abuse this issue to crash the device.
Amcrest 1080-lite 8ch Firmware -
Amcrest Amdv10814-h5 Firmware -
Amcrest Ipm-721 Firmware
Amcrest Ip2m-841 Firmware
Amcrest Ip2m-841-v3 Firmware
Amcrest Ip2m-853ew Firmware
Amcrest Ip2m-858w Firmware
Amcrest Ip2m-866w Firmware
Amcrest Ip2m-866ew Firmware
Amcrest Ip4m-1053ew Firmware
Amcrest Ip8m-2454ew Firmware
Amcrest Ip8m-2493eb Firmware
Amcrest Ip8m-2496eb Firmware
Amcrest Ip8m-2597e Firmware
Amcrest Ip8m-mb2546ew Firmware
Amcrest Ip8m-mt2544ew Firmware
Amcrest Ip8m-t2499ew Firmware
Amcrest Ipm-hx1 Firmware
NA
CVE-2023-3050
Reliance on Cookies without Validation and Integrity Checking in a Security Decision vulnerability in TMT Lockcell allows Privilege Abuse, Authentication Bypass.This issue affects Lockcell: prior to 15.
Tmtmakine Lockcell Firmware
NA
CVE-2023-0882
Improper Input Validation, Authorization Bypass Through User-Controlled Key vulnerability in Kron Tech Single Connect on Windows allows Privilege Abuse. This issue affects Single Connect: 2.16.
Krontech Single Connect
4.6
CVSSv2
CVE-2018-6756
Authentication Abuse vulnerability in Microsoft Windows client in McAfee True Key (TK) 5.1.230.7 and previous versions allows local users to execute unauthorized commands via specially crafted malware.
Mcafee True Key
5.8
CVSSv2
CVE-2019-3890
It exists evolution-ews prior to 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
Gnome Evolution-ews
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 7.0
NA
CVE-2024-2169
Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
1 Github repository
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »