Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
deep security vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-3750
The utilities function in all versions <= 0.5.0 of the deep-extend node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that wil...
Deep Extend Project Deep Extend
7.5
CVSSv3
CVE-2018-8174
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Se...
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2016 1803
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows 7 -
Microsoft Windows 10 1607
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008 R2
Microsoft Windows 8.1 -
Microsoft Windows Rt 8.1 -
Microsoft Windows 10 -
Microsoft Windows 10 1703
Microsoft Windows Server 2012 -
20 Github repositories
12 Articles
7
CVSSv3
CVE-2018-6218
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an malicious user to run arbitrary code on a vulnerable system.
Trendmicro Deep Security 10.0
Trendmicro Deep Security 10.1
Trendmicro Endpoint Sensor 1.6
Trendmicro Officescan 11.0
Trendmicro Officescan 12.0
Trendmicro Security 12.0
Trendmicro Worry-free Business Security 9.5
7.8
CVSSv3
CVE-2017-12595
The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote malicious users to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as...
Qpdf Project Qpdf 6.0.0
Qpdf Project Qpdf 7.0.b1
8.8
CVSSv3
CVE-2015-8988
Unquoted executable path vulnerability in Client Management and Gateway components in McAfee (now Intel Security) ePO Deep Command (eDC) 2.2 and 2.1 allows authenticated users to execute a command of their choice via dropping a malicious file for the path.
Mcafee Epo Deep Command 2.1
Mcafee Epo Deep Command 2.2
7.5
CVSSv3
CVE-2016-4425
Jansson 2.7 and previous versions allows context-dependent malicious users to cause a denial of service (deep recursion, stack consumption, and crash) via crafted JSON data.
Jansson Project Jansson
5.9
CVSSv3
CVE-2016-4421
epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.12.x prior to 1.12.10 and 2.x prior to 2.0.2 allows remote malicious users to cause a denial of service (deep recursion, stack consumption, and application crash) via a packet that specifies deeply nested data...
Wireshark Wireshark 1.12.6
Wireshark Wireshark 1.12.5
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.12.8
Wireshark Wireshark 1.12.7
Wireshark Wireshark 2.0.1
Wireshark Wireshark 1.12.3
Wireshark Wireshark 1.12.2
Wireshark Wireshark 2.0.0
Wireshark Wireshark 1.12.9
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.12.0
NA
CVE-2014-6332
OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote malicious users to execute arbitrary code via a craft...
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
9 EDB exploits
10 Github repositories
9 Articles
NA
CVE-2014-4330
The Dumper method in Data::Dumper prior to 2.154, as used in Perl 5.20.1 and previous versions, allows context-dependent malicious users to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large num...
Perl Perl
Data Dumper Project Data Dumper
NA
CVE-2013-1813
util-linux/mdev.c in BusyBox prior to 1.21.0 uses 0777 permissions for parent directories when creating nested directories under /dev/, which allows local users to have unknown impact and attack vectors.
Redhat Enterprise Linux 6.0
T-mobile Tm-ac1900 3.0.0.4.376 3169
Busybox Busybox 0.38
Busybox Busybox 0.46
Busybox Busybox 0.47
Busybox Busybox 0.60.1
Busybox Busybox 0.60.2
Busybox Busybox 0.60.3
Busybox Busybox 1.1.2
Busybox Busybox 1.1.3
Busybox Busybox 1.11.1
Busybox Busybox 1.11.2
Busybox Busybox 1.13.1
Busybox Busybox 1.13.2
Busybox Busybox 1.14.4
Busybox Busybox 1.15.0
Busybox Busybox 1.17.0
Busybox Busybox 1.17.1
Busybox Busybox 1.18.4
Busybox Busybox 1.18.5
Busybox Busybox 1.2.2
Busybox Busybox 1.2.2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »