Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
abuse vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-1462
Authorization Bypass Through User-Controlled Key vulnerability in Vadi Corporate Information Systems DigiKent allows Authentication Bypass, Authentication Abuse. This issue affects DigiKent: prior to 23.03.20.
Vadi Digikent
NA
CVE-2023-2702
Authorization Bypass Through User-Controlled Key vulnerability in Finex Media Competition Management System allows Authentication Abuse, Authentication Bypass.This issue affects Competition Management System: prior to 23.07.
Finexmedia Competition Management System
NA
CVE-2023-2065
Authorization Bypass Through User-Controlled Key vulnerability in Armoli Technology Cargo Tracking System allows Authentication Abuse, Authentication Bypass.This issue affects Cargo Tracking System: prior to 3558f28 .
Armoli Cargo Tracking System
445
VMScore
CVE-2010-3667
TYPO3 prior to 4.1.14, 4.2.x prior to 4.2.13, 4.3.x prior to 4.3.4 and 4.4.x prior to 4.4.1 allows Spam Abuse in the native form content element.
Typo3 Typo3
383
VMScore
CVE-2019-10212
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
Redhat Undertow
Redhat Jboss Data Grid -
Redhat Jboss Data Grid
Redhat Jboss Enterprise Application Platform -
Redhat Jboss Fuse
Redhat Openshift Application Runtimes -
Redhat Single Sign-on
Netapp Active Iq Unified Manager -
Redhat Jboss Enterprise Application Platform 7.2
Redhat Jboss Enterprise Application Platform 7.3
Redhat Jboss Enterprise Application Platform 7.4
NA
CVE-2024-2169
Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
1 Github repository
1 Article
516
VMScore
CVE-2019-3890
It exists evolution-ews prior to 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
Gnome Evolution-ews
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 7.0
NA
CVE-2023-0882
Improper Input Validation, Authorization Bypass Through User-Controlled Key vulnerability in Kron Tech Single Connect on Windows allows Privilege Abuse. This issue affects Single Connect: 2.16.
Krontech Single Connect
605
VMScore
CVE-2020-5736
Amcrest cameras and NVR are vulnerable to a null pointer dereference over port 37777. An authenticated remote attacker can abuse this issue to crash the device.
Amcrest 1080-lite 8ch Firmware -
Amcrest Amdv10814-h5 Firmware -
Amcrest Ipm-721 Firmware
Amcrest Ip2m-841 Firmware
Amcrest Ip2m-841-v3 Firmware
Amcrest Ip2m-853ew Firmware
Amcrest Ip2m-858w Firmware
Amcrest Ip2m-866w Firmware
Amcrest Ip2m-866ew Firmware
Amcrest Ip4m-1053ew Firmware
Amcrest Ip8m-2454ew Firmware
Amcrest Ip8m-2493eb Firmware
Amcrest Ip8m-2496eb Firmware
Amcrest Ip8m-2597e Firmware
Amcrest Ip8m-mb2546ew Firmware
Amcrest Ip8m-mt2544ew Firmware
Amcrest Ip8m-t2499ew Firmware
Amcrest Ipm-hx1 Firmware
409
VMScore
CVE-2018-6756
Authentication Abuse vulnerability in Microsoft Windows client in McAfee True Key (TK) 5.1.230.7 and previous versions allows local users to execute unauthorized commands via specially crafted malware.
Mcafee True Key
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »