Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
information technology vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2020-8746
Integer overflow in subsystem for Intel(R) AMT versions prior to 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Intel Active Management Technology Firmware
Netapp Cloud Backup -
7.8
CVSSv3
CVE-2020-8760
Integer overflow in subsystem for Intel(R) AMT versions prior to 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Active Management Technology Firmware
Netapp Cloud Backup -
8.8
CVSSv3
CVE-2020-8749
Out-of-bounds read in subsystem for Intel(R) AMT versions prior to 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Intel Active Management Technology Firmware
Netapp Cloud Backup -
6.7
CVSSv3
CVE-2020-8757
Out-of-bounds read in subsystem for Intel(R) AMT versions prior to 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Active Management Technology Firmware
Netapp Cloud Backup -
7.8
CVSSv3
CVE-2019-0091
Code injection vulnerability in installer for Intel(R) CSME prior to 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.
Intel Converged Security And Management Engine
Intel Trusted Execution Technology
4.6
CVSSv3
CVE-2020-8751
Insufficient control flow management in subsystem for Intel(R) CSME versions prior to 11.8.80, Intel(R) TXE versions prior to 3.1.80 may allow an unauthenticated user to potentially enable information disclosure via physical access.
Intel Converged Security And Manageability Engine
Intel Trusted Execution Technology
7.5
CVSSv3
CVE-2020-8754
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions prior to 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
Intel Active Management Technology Firmware
Netapp Cloud Backup -
Intel Standard Manageability
9.8
CVSSv3
CVE-2020-8752
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions prior to 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
Intel Active Management Technology Firmware
Netapp Cloud Backup -
Intel Standard Manageability
5.5
CVSSv3
CVE-2020-15358
In SQLite prior to 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
Sqlite Sqlite
Canonical Ubuntu Linux 20.04
Apple Iphone Os
Apple Watchos
Apple Icloud
Apple Tvos
Apple Ipados
Apple Macos
Oracle Outside In Technology 8.5.4
Oracle Outside In Technology 8.5.5
Oracle Hyperion Infrastructure Technology 11.1.2.4
Oracle Enterprise Manager Ops Center 12.4.0.0
Oracle Communications Network Charging And Control 12.0.2
Oracle Mysql
Oracle Communications Network Charging And Control 6.0.1
Oracle Communications Messaging Server 8.1
Oracle Communications Cloud Native Core Policy 1.14.0
Siemens Sinec Infrastructure Network Services
NA
CVE-2006-0026
Buffer overflow in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows local and possibly remote malicious users to execute arbitrary code via crafted Active Server Pages (ASP).
Microsoft Internet Information Services 5.0
Microsoft Internet Information Server 6.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »