Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
build environment vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0013
Format string vulnerability in nslookupComplain function in BIND 4 allows remote malicious users to gain root privileges.
Isc Bind 4.9.3
Isc Bind 4.9.5
Isc Bind 4.9.6
Isc Bind 4.9.7
NA
CVE-2010-0574
Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 3.2 prior to 3.2.215.0; 4.1 and 4.2 prior to 4.2.205.0; 4.1M and 4.2M prior to 4.2.207.54M; 5.0, 5.1, and 6.0 prior to 6.0.188.0; and 5.2 prior to 5.2.193.11 allows remote malicious users to cause a denial ...
Cisco Wireless Lan Controller Software 4.1
Cisco Wireless Lan Controller Software 4.1m
Cisco Wireless Lan Controller Software 4.2
Cisco Wireless Lan Controller Software 4.2m
Cisco Wireless Lan Controller Software 4.0.179.8
Cisco Wireless Lan Controller Software 4.0.196
Cisco Wireless Lan Controller Software 4.0.206.0
Cisco Wireless Lan Controller Software 4.0.217.0
Cisco Wireless Lan Controller Software 5.0.148.0
Cisco Wireless Lan Controller Software 5.0.148.2
Cisco Wireless Lan Controller Software 5.1.151.0
Cisco Wireless Lan Controller Software 5.1.152.0
Cisco Wireless Lan Controller Software 3.2
Cisco Wireless Lan Controller Software 3.2.150.10
Cisco Wireless Lan Controller Software 6.0
Cisco Wireless Lan Controller Software 3.2.171.5
Cisco Wireless Lan Controller Software 4.0.155.0
Cisco Wireless Lan Controller Software 4.0.179.11
Cisco Wireless Lan Controller Software 4.0.219.0
Cisco Wireless Lan Controller Software 4.1.181.0
Cisco Wireless Lan Controller Software 4.2.176.0
Cisco Wireless Lan Controller Software 4.2.61.0
5.3
CVSSv3
CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of d...
Golang Go
9.8
CVSSv3
CVE-2023-29402
The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules wh...
Golang Go
Fedoraproject Fedora 38
6.1
CVSSv3
CVE-2019-10219
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
Redhat Hibernate Validator
Redhat Hibernate Validator 6.1.0
Redhat Single Sign-on -
Redhat Jboss Enterprise Application Platform -
Redhat Jboss Data Grid -
Redhat Openshift Application Runtimes -
Redhat Fuse 1.0
Redhat Jboss Enterprise Application Platform 7.2
Redhat Jboss Enterprise Application Platform 7.3
Netapp Active Iq Unified Manager -
Netapp Element -
Netapp Snapcenter Plug-in -
Netapp Management Services For Element Software And Netapp Hci -
Oracle Flexcube Investor Servicing 12.3.0
Oracle Flexcube Investor Servicing 12.1.0
Oracle Solaris 11
Oracle Flexcube Private Banking 12.1.0
Oracle Insurance Policy Administration J2ee 10.2.0
Oracle Flexcube Private Banking 12.0.0
Oracle Flexcube Investor Servicing 12.0.4
Oracle Weblogic Server 12.1.3.0.0
Oracle Retail Integration Bus 13.0
9.8
CVSSv3
CVE-2023-29404
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAG...
Golang Go
Fedoraproject Fedora 38
9.8
CVSSv3
CVE-2023-29405
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAG...
Golang Go
Fedoraproject Fedora 38
NA
CVE-2007-3285
Mozilla Firefox prior to 2.0.0.5, when run on Windows, allows remote malicious users to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Fire...
Mozilla Firefox 0.10.1
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.3
Mozilla Firefox 1.5.0.1
Mozilla Firefox 1.5.0.11
Mozilla Firefox 1.5.0.6
Mozilla Firefox 1.5.0.8
Mozilla Firefox 1.5.6
Mozilla Firefox 1.5.8
Mozilla Firefox 2.0
Mozilla Firefox 1.0.5
Mozilla Firefox 1.0.6
Mozilla Firefox 1.0.7
Mozilla Firefox 1.0.8
Mozilla Firefox 1.5.1
Mozilla Firefox 1.5.2
Mozilla Firefox 1.5.3
Mozilla Firefox 1.5.4
Mozilla Firefox 0.9
Mozilla Firefox 0.9.1
Mozilla Firefox 0.9.2
Mozilla Firefox 0.9.3
NA
CVE-2004-0420
The Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote malicious users to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet ...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Ie 6.0
7.5
CVSSv3
CVE-2023-24536
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can under...
Golang Go
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »