Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
a-blog vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2017-9758
Savitech driver packages for Windows silently install a self-signed certificate into the Trusted Root Certification Authorities store, aka "Inaudible Subversion."
Savitech-ic Savitech Driver
4.3
CVSSv2
CVE-2016-1897
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.
Ffmpeg Ffmpeg 2.7.4
Ffmpeg Ffmpeg 2.7.3
Ffmpeg Ffmpeg 2.6.2
Ffmpeg Ffmpeg 2.6.1
Ffmpeg Ffmpeg 2.5.4
Ffmpeg Ffmpeg 2.5.3
Ffmpeg Ffmpeg 2.4.9
Ffmpeg Ffmpeg 2.4.8
Ffmpeg Ffmpeg 2.4
Ffmpeg Ffmpeg 2.3.6
Ffmpeg Ffmpeg 2.2.16
Ffmpeg Ffmpeg 2.2.15
Ffmpeg Ffmpeg 2.2.8
Ffmpeg Ffmpeg 2.2.7
Ffmpeg Ffmpeg 2.1.8
Ffmpeg Ffmpeg 2.1.7
Ffmpeg Ffmpeg 2.1
Ffmpeg Ffmpeg 2.0.7
Ffmpeg Ffmpeg 2.0
Ffmpeg Ffmpeg 2.8.4
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.7.2
2 Github repositories
4.3
CVSSv2
CVE-2016-1898
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file.
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.8.2
Ffmpeg Ffmpeg 2.7
Ffmpeg Ffmpeg 2.6.6
Ffmpeg Ffmpeg 2.5.9
Ffmpeg Ffmpeg 2.5.8
Ffmpeg Ffmpeg 2.5.1
Ffmpeg Ffmpeg 2.5
Ffmpeg Ffmpeg 2.4.5
Ffmpeg Ffmpeg 2.4.4
Ffmpeg Ffmpeg 2.3.4
Ffmpeg Ffmpeg 2.3.3
Ffmpeg Ffmpeg 2.2.13
Ffmpeg Ffmpeg 2.2.12
Ffmpeg Ffmpeg 2.2.11
Ffmpeg Ffmpeg 2.2.4
Ffmpeg Ffmpeg 2.2.3
Ffmpeg Ffmpeg 2.1.5
Ffmpeg Ffmpeg 2.1.4
Ffmpeg Ffmpeg 2.0.4
Ffmpeg Ffmpeg 2.0.3
Ffmpeg Ffmpeg 2.8.1
1 Github repository
10
CVSSv2
CVE-2020-10188
utility.c in telnetd in netkit telnet up to and including 0.17 allows remote malicious users to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.
Netkit Telnet Project Netkit Telnet
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Arista Eos
Arista Eos 4.24.0f
Oracle Communications Performance Intelligence Center 10.4.0.2
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 12.3
Juniper Junos 15.1x49-d30
Juniper Junos 12.3x48
Juniper Junos 12.3x50
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
4.3
CVSSv2
CVE-2014-3393
The Clientless SSL VPN portal customization framework in Cisco ASA Software 8.2 prior to 8.2(5.51), 8.3 prior to 8.3(2.42), 8.4 prior to 8.4(7.23), 8.6 prior to 8.6(1.14), 9.0 prior to 9.0(4.24), 9.1 prior to 9.1(5.12), and 9.2 prior to 9.2(2.4) does not properly implement authen...
Cisco Adaptive Security Appliance Software 9.1.1.4
Cisco Adaptive Security Appliance Software 9.1.4
Cisco Adaptive Security Appliance Software 8.6.1.12
Cisco Adaptive Security Appliance Software 9.1.3
Cisco Adaptive Security Appliance Software 9.1.2
Cisco Adaptive Security Appliance Software 9.2.3
Cisco Adaptive Security Appliance Software 9.1.1
Cisco Adaptive Security Appliance Software 9.1.2.8
Cisco Adaptive Security Appliance Software 9.1.5.15
Cisco Adaptive Security Appliance Software 9.1.5.10
Cisco Adaptive Security Appliance Software 9.2.1
Cisco Adaptive Security Appliance Software 9.1.5
Cisco Adaptive Security Appliance Software 9.2.2.4
Cisco Adaptive Security Appliance Software 9.1.5.12
Cisco Adaptive Security Appliance Software 9.1.3.2
Cisco Adaptive Security Appliance Software 9.2.2
Cisco Adaptive Security Appliance Software 9.2.0
Cisco Adaptive Security Appliance Software 8.3.2.40
Cisco Adaptive Security Appliance Software 8.3.1
Cisco Adaptive Security Appliance Software 8.2.2
Cisco Adaptive Security Appliance Software 8.3.1.1
Cisco Adaptive Security Appliance Software 8.3.1.6
1 Article
2.1
CVSSv2
CVE-2017-8949
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
Hp Sitescope 11.21
Hp Sitescope 11.22
Hp Sitescope 11.23
Hp Sitescope 11.24
Hp Sitescope 11.30
Hp Sitescope 11.31
Hp Sitescope 11.32
Hp Sitescope 11.33
Hp Sitescope 11.20
Hp Sitescope 11.24.391
Hp Sitescope 11.30.521
2.1
CVSSv2
CVE-2017-8950
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
Hp Sitescope 11.20
Hp Sitescope 11.22
Hp Sitescope 11.32
Hp Sitescope 11.24
Hp Sitescope 11.24.391
Hp Sitescope 11.30
Hp Sitescope 11.30.521
Hp Sitescope 11.31
Hp Sitescope 11.21
Hp Sitescope 11.23
Hp Sitescope 11.33
4.6
CVSSv2
CVE-2017-8951
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
Hp Sitescope 11.24.391
Hp Sitescope 11.30
Hp Sitescope 11.30.521
Hp Sitescope 11.31
Hp Sitescope 11.32
Hp Sitescope 11.21
Hp Sitescope 11.23
Hp Sitescope 11.33
Hp Sitescope 11.20
Hp Sitescope 11.22
Hp Sitescope 11.24
5
CVSSv2
CVE-2017-8952
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
Hp Sitescope 11.22
Hp Sitescope 11.23
Hp Sitescope 11.24
Hp Sitescope 11.24.391
Hp Sitescope 11.21
Hp Sitescope 11.30
Hp Sitescope 11.31
Hp Sitescope 11.33
Hp Sitescope 11.20
Hp Sitescope 11.30.521
Hp Sitescope 11.32
2.6
CVSSv2
CVE-2016-0701
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 prior to 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote malicious users to discover a private DH exponent by making multiple ha...
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl 1.0.2d
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
NEXT »