Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cells vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-23458
Toast UI Grid is a component to display and edit data. Versions before 4.21.3 are vulnerable to cross-site scripting attacks when pasting specially crafted content into editable cells. This issue was fixed in version 4.21.3. There are no known workarounds.
Nhn Toast Ui Grid
383
VMScore
CVE-2020-27819
An issue exists in libxls before and including 1.6.1 when reading Microsoft Excel files. A NULL pointer dereference vulnerability exists when parsing XLS cells in libxls/xls2csv.c:199. It could allow a remote malicious user to cause a denial of service via crafted XLS file.
Libxls Project Libxls
605
VMScore
CVE-2020-25445
The “Subscribe” feature in Ultimate Booking System Booking Core 1.7.0 is vulnerable to CSV formula injection. The input containing the excel formula is not being sanitized by the application. As a result when admin in backend download and open the csv, content of the ...
Bookingcore Booking Core 1.7.0
578
VMScore
CVE-2018-15755
Cloud Foundry CF Networking Release, versions 2.11.0 before 2.16.0, contain an internal api endpoint vulnerable to SQL injection between Diego cells and the policy server. A remote authenticated malicious user with mTLS certs can issue arbitrary SQL queries and gain access to the...
Cloud Foundry Cf-networking
356
VMScore
CVE-2021-41270
Symfony/Serializer handles serializing and deserializing data structures for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Symfony versions 4.1.0 prior to 4.4.35 and versions 5.0.0 prior to 5.3.12 are vulnerable to CSV injection, ...
Sensiolabs Symfony
Fedoraproject Fedora 34
Fedoraproject Fedora 35
828
VMScore
CVE-2015-6045
Use-after-free vulnerability in the CElement object implementation in Microsoft Internet Explorer 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript that improperly interacts with use of the Cascading...
Microsoft Internet Explorer 11
534
VMScore
CVE-2020-15255
In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign). This is fixed in version 1.19.23...
Anuko Time Tracker
516
VMScore
CVE-2014-5117
Tor prior to 0.2.4.23 and 0.2.5 prior to 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote malicious users to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a ...
Torproject Tor 0.0.2
Torproject Tor 0.0.3
Torproject Tor 0.0.4
Torproject Tor 0.0.7.2
Torproject Tor 0.0.7.3
Torproject Tor 0.0.9.5
Torproject Tor 0.0.9.6
Torproject Tor 0.1.0.14
Torproject Tor 0.1.0.15
Torproject Tor 0.1.1.24
Torproject Tor 0.1.1.25
Torproject Tor 0.1.2.18
Torproject Tor 0.1.2.19
Torproject Tor 0.2.2.19
Torproject Tor 0.2.2.20
Torproject Tor 0.2.2.27
Torproject Tor 0.2.2.28
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.36
Torproject Tor 0.2.3.17
Torproject Tor 0.2.3.18
Torproject Tor 0.2.4.1
NA
CVE-2022-31733
Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is enabled AND unproxied ports are t...
Cloudfoundry Diego
Cloudfoundry Cf-deployment
445
VMScore
CVE-2016-0780
It exists that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions before 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions before 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota v...
Cloudfoundry Cf-release 231
Pivotal Software Cloud Foundry Elastic Runtime 1.5.0
Pivotal Software Cloud Foundry Elastic Runtime 1.5.1
Pivotal Software Cloud Foundry Elastic Runtime 1.5.2
Pivotal Software Cloud Foundry Elastic Runtime 1.5.3
Pivotal Software Cloud Foundry Elastic Runtime 1.5.4
Pivotal Software Cloud Foundry Elastic Runtime 1.5.5
Pivotal Software Cloud Foundry Elastic Runtime 1.5.6
Pivotal Software Cloud Foundry Elastic Runtime 1.5.7
Pivotal Software Cloud Foundry Elastic Runtime 1.5.8
Pivotal Software Cloud Foundry Elastic Runtime 1.5.9
Pivotal Software Cloud Foundry Elastic Runtime 1.5.10
Pivotal Software Cloud Foundry Elastic Runtime 1.5.11
Pivotal Software Cloud Foundry Elastic Runtime 1.5.12
Pivotal Software Cloud Foundry Elastic Runtime 1.5.13
Pivotal Software Cloud Foundry Elastic Runtime 1.5.14
Pivotal Software Cloud Foundry Elastic Runtime 1.5.15
Pivotal Software Cloud Foundry Elastic Runtime 1.5.16
Pivotal Software Cloud Foundry Elastic Runtime 1.6.0
Pivotal Software Cloud Foundry Elastic Runtime 1.6.1
Pivotal Software Cloud Foundry Elastic Runtime 1.6.2
Pivotal Software Cloud Foundry Elastic Runtime 1.6.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »