Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
discovery vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2007-2514
Stack-based buffer overflow in XferWan.exe as used in multiple products including (1) Symantec Discovery 6.5, (2) Numara Asset Manager 8.0, and (3) Centennial UK Ltd Discovery 2006 Feature Pack, allows remote malicious users to execute arbitrary code via a long request. NOTE: thi...
Symantec Discovery 6.5
Centennial Discovery 2006 Featurepack1
Numara Asset Manager 8.0
9
CVSSv2
CVE-2020-28648
Improper input validation in the Auto-Discovery component of Nagios XI prior to 5.7.5 allows an authenticated malicious user to execute remote code.
Nagios Nagios Xi
9
CVSSv2
CVE-2020-12078
An issue exists in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is ...
Opmantek Open-audit 3.3.1
2 Github repositories
9
CVSSv2
CVE-2019-17501
Centreon 19.04 allows malicious users to execute arbitrary OS commands via the Command Line field of main.php?p=60807&type=4 (aka the Configuration > Commands > Discovery screen). CVE-2019-17501 and CVE-2019-16405 are similar to one another and may be the same.
Centreon Centreon 19.04.0
9
CVSSv2
CVE-2016-8586
detected_potential_files.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
9
CVSSv2
CVE-2016-8589
log_query_dae.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
9
CVSSv2
CVE-2016-8591
log_query.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
9
CVSSv2
CVE-2016-8585
admin_sys_time.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the timezone parameter.
Trendmicro Threat Discovery Appliance
9
CVSSv2
CVE-2016-8590
log_query_dlp.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
9
CVSSv2
CVE-2016-8592
log_query_system.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
administrator privileges
CVE-2024-1579
hardcoded
CVE-2023-20198
CVE-2024-33587
CVE-2024-33449
CVE-2024-4308
HTML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »