Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
abuse vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2020-15388
A vulnerability in the Brocade Fabric OS before Brocade Fabric OS v9.0.1a, v8.2.3, v8.2.0_CBN4, and v7.4.2h could allow an authenticated CLI user to abuse the history command to write arbitrary content to files.
Broadcom Fabric Operating System 8.2.0
Broadcom Fabric Operating System
Broadcom Fabric Operating System 8.2.0a
Broadcom Fabric Operating System 8.2.3
6.5
CVSSv3
CVE-2020-12668
Jinjava prior to 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
Hubspot Jinjava
8.8
CVSSv3
CVE-2020-27887
An issue exists in EyesOfNetwork 5.3 up to and including 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php.
Eyesofnetwork Eyesofnetwork
6.1
CVSSv3
CVE-2023-6627
The WP Go Maps (formerly WP Google Maps) WordPress plugin prior to 9.0.28 does not properly protect most of its REST API routes, which attackers can abuse to store malicious HTML/Javascript on the site.
Codecabin Wp Go Maps
6.8
CVSSv3
CVE-2023-42571
Abuse of remote unlock in Find My Mobile prior to version 7.3.13.4 allows physical malicious user to unlock the device remotely by resetting the Samsung Account password with SMS verification when user lost the device.
Samsung Find My Mobile
7.8
CVSSv3
CVE-2020-1712
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate thei...
Systemd Project Systemd
Redhat Enterprise Linux 8.0
Redhat Openshift Container Platform 4.0
Redhat Discovery -
Redhat Migration Toolkit 1.0
Redhat Ceph Storage 4.0
Debian Debian Linux 9.0
1 Github repository
1 Article
6.5
CVSSv3
CVE-2019-3666
API Abuse/Misuse vulnerability in the web interface in McAfee Web Advisor (WA) before 4.1.1.48 allows remote unauthenticated malicious user to allow the browser to navigate to restricted websites via a carefully crafted web site.
Mcafee Webadvisor
9.8
CVSSv3
CVE-2023-6974
A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
Lfprojects Mlflow
6.6
CVSSv3
CVE-2019-12794
An issue exists in MISP 2.4.108. Organization admins could reset credentials for site admins (organization admins have the inherent ability to reset passwords for all of their organization's users). This, however, could be abused in a situation where the host organization of...
Misp Misp 2.4.108
7.2
CVSSv3
CVE-2020-15849
Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's...
Re-desk Re\\ Desk
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »