Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
a-blog a-blog vulnerabilities and exploits
(subscribe to this query)
516
VMScore
CVE-2017-9758
Savitech driver packages for Windows silently install a self-signed certificate into the Trusted Root Certification Authorities store, aka "Inaudible Subversion."
Savitech-ic Savitech Driver
890
VMScore
CVE-2020-10188
utility.c in telnetd in netkit telnet up to and including 0.17 allows remote malicious users to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.
Netkit Telnet Project Netkit Telnet
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Arista Eos
Arista Eos 4.24.0f
Oracle Communications Performance Intelligence Center 10.4.0.2
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 12.3
Juniper Junos 15.1x49-d30
Juniper Junos 12.3x48
Juniper Junos 12.3x50
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
384
VMScore
CVE-2016-1897
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.
Ffmpeg Ffmpeg 2.7.4
Ffmpeg Ffmpeg 2.7.3
Ffmpeg Ffmpeg 2.6.2
Ffmpeg Ffmpeg 2.6.1
Ffmpeg Ffmpeg 2.5.4
Ffmpeg Ffmpeg 2.5.3
Ffmpeg Ffmpeg 2.4.9
Ffmpeg Ffmpeg 2.4.8
Ffmpeg Ffmpeg 2.4
Ffmpeg Ffmpeg 2.3.6
Ffmpeg Ffmpeg 2.2.16
Ffmpeg Ffmpeg 2.2.15
Ffmpeg Ffmpeg 2.2.8
Ffmpeg Ffmpeg 2.2.7
Ffmpeg Ffmpeg 2.1.8
Ffmpeg Ffmpeg 2.1.7
Ffmpeg Ffmpeg 2.1
Ffmpeg Ffmpeg 2.0.7
Ffmpeg Ffmpeg 2.0
Ffmpeg Ffmpeg 2.8.4
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.7.2
2 Github repositories
383
VMScore
CVE-2016-1898
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file.
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.8.2
Ffmpeg Ffmpeg 2.7
Ffmpeg Ffmpeg 2.6.6
Ffmpeg Ffmpeg 2.5.9
Ffmpeg Ffmpeg 2.5.8
Ffmpeg Ffmpeg 2.5.1
Ffmpeg Ffmpeg 2.5
Ffmpeg Ffmpeg 2.4.5
Ffmpeg Ffmpeg 2.4.4
Ffmpeg Ffmpeg 2.3.4
Ffmpeg Ffmpeg 2.3.3
Ffmpeg Ffmpeg 2.2.13
Ffmpeg Ffmpeg 2.2.12
Ffmpeg Ffmpeg 2.2.11
Ffmpeg Ffmpeg 2.2.4
Ffmpeg Ffmpeg 2.2.3
Ffmpeg Ffmpeg 2.1.5
Ffmpeg Ffmpeg 2.1.4
Ffmpeg Ffmpeg 2.0.4
Ffmpeg Ffmpeg 2.0.3
Ffmpeg Ffmpeg 2.8.1
1 Github repository
383
VMScore
CVE-2014-3393
The Clientless SSL VPN portal customization framework in Cisco ASA Software 8.2 prior to 8.2(5.51), 8.3 prior to 8.3(2.42), 8.4 prior to 8.4(7.23), 8.6 prior to 8.6(1.14), 9.0 prior to 9.0(4.24), 9.1 prior to 9.1(5.12), and 9.2 prior to 9.2(2.4) does not properly implement authen...
Cisco Adaptive Security Appliance Software 9.1.1.4
Cisco Adaptive Security Appliance Software 9.1.4
Cisco Adaptive Security Appliance Software 8.6.1.12
Cisco Adaptive Security Appliance Software 9.1.3
Cisco Adaptive Security Appliance Software 9.1.2
Cisco Adaptive Security Appliance Software 9.2.3
Cisco Adaptive Security Appliance Software 9.1.1
Cisco Adaptive Security Appliance Software 9.1.2.8
Cisco Adaptive Security Appliance Software 9.1.5.15
Cisco Adaptive Security Appliance Software 9.1.5.10
Cisco Adaptive Security Appliance Software 9.2.1
Cisco Adaptive Security Appliance Software 9.1.5
Cisco Adaptive Security Appliance Software 9.2.2.4
Cisco Adaptive Security Appliance Software 9.1.5.12
Cisco Adaptive Security Appliance Software 9.1.3.2
Cisco Adaptive Security Appliance Software 9.2.2
Cisco Adaptive Security Appliance Software 9.2.0
Cisco Adaptive Security Appliance Software 8.3.2.40
Cisco Adaptive Security Appliance Software 8.3.1
Cisco Adaptive Security Appliance Software 8.2.2
Cisco Adaptive Security Appliance Software 8.3.1.1
Cisco Adaptive Security Appliance Software 8.3.1.6
1 Article
187
VMScore
CVE-2017-8949
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
Hp Sitescope 11.21
Hp Sitescope 11.22
Hp Sitescope 11.23
Hp Sitescope 11.24
Hp Sitescope 11.30
Hp Sitescope 11.31
Hp Sitescope 11.32
Hp Sitescope 11.33
Hp Sitescope 11.20
Hp Sitescope 11.24.391
Hp Sitescope 11.30.521
187
VMScore
CVE-2017-8950
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
Hp Sitescope 11.20
Hp Sitescope 11.22
Hp Sitescope 11.32
Hp Sitescope 11.24
Hp Sitescope 11.24.391
Hp Sitescope 11.30
Hp Sitescope 11.30.521
Hp Sitescope 11.31
Hp Sitescope 11.21
Hp Sitescope 11.23
Hp Sitescope 11.33
409
VMScore
CVE-2017-8951
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
Hp Sitescope 11.24.391
Hp Sitescope 11.30
Hp Sitescope 11.30.521
Hp Sitescope 11.31
Hp Sitescope 11.32
Hp Sitescope 11.21
Hp Sitescope 11.23
Hp Sitescope 11.33
Hp Sitescope 11.20
Hp Sitescope 11.22
Hp Sitescope 11.24
445
VMScore
CVE-2017-8952
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
Hp Sitescope 11.22
Hp Sitescope 11.23
Hp Sitescope 11.24
Hp Sitescope 11.24.391
Hp Sitescope 11.21
Hp Sitescope 11.30
Hp Sitescope 11.31
Hp Sitescope 11.33
Hp Sitescope 11.20
Hp Sitescope 11.30.521
Hp Sitescope 11.32
232
VMScore
CVE-2016-0701
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 prior to 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote malicious users to discover a private DH exponent by making multiple ha...
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl 1.0.2d
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
NEXT »