Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-36121
netty-incubator-codec-ohttp is the OHTTP implementation for netty. BoringSSLAEADContext keeps track of how many OHTTP responses have been sent and uses this sequence number to calculate the appropriate nonce to use with the encryption algorithm. Unfortunately, two separate error...
NA
CVE-2022-28657
Apport does not disable python crash handler before entering chroot
NA
CVE-2024-36675
LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function.
NA
CVE-2022-28652
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
NA
CVE-2022-28655
is_closing_session() allows users to create arbitrary tcp dbus connections
NA
CVE-2022-28654
is_closing_session() allows users to fill up apport.log
NA
CVE-2022-28658
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
NA
CVE-2022-28656
is_closing_session() allows users to consume RAM in the Apport process
NA
CVE-2024-5505
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability. The specific flaw exists within the UpLoadServlet class. The issue results from ...
NA
CVE-2024-4219
before 23.2, it is possible to perform arbitrary Server-Side requests via HTTP-based connectors within BeyondInsight, resulting in a server-side request forgery vulnerability.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »