Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
common vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-45354
Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated remote malicious user to execute arbitrary code on the operating system by using the Common Management Portal web interface. This is also known as OCMP-6589.
Atos Unify Openscape Common Management 10
7.2
CVSSv2
CVE-2000-1202
ikeyman in IBM IBMHSSSB 1.0 sets the CLASSPATH environmental variable to include the user's own CLASSPATH directories before the system's directories, which allows a malicious local user to execute arbitrary code as root via a Trojan horse Ikeyman class.
Ibm Http Server Ssl Module Common 1.0
7.6
CVSSv2
CVE-2006-5273
Heap-based buffer overflow in McAfee ePolicy Orchestrator 3.5 up to and including 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.5.5.438 up to and including 3.6.0.453 allows remote malicious users to execute arbitrary code via a crafted packet.
Mcafee Protectionpilot 1.1.1
Mcafee Protectionpilot 1.5.0
Mcafee Common Management Agent
Mcafee Common Management Agent 3.6.0.438
Mcafee E-business Server 3.5
Mcafee E-business Server 3.6.1
9.3
CVSSv2
CVE-2009-2850
Multiple buffer overflows in NASA Common Data Format (CDF) allow context-dependent malicious users to execute arbitrary code, as demonstrated using (1) an array index error in the ReadAEDRList64 function, and other errors in the (2) SearchForRecord_r_64, (3) LastRecord64, (4) CDF...
Nasa Goddard Space Flight Center Common Data Format
7.2
CVSSv2
CVE-2005-4505
Unquoted Windows search path vulnerability in McAfee VirusScan Enterprise 8.0i (patch 11) and CMA 3.5 (patch 5) might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run by naPrdMgr.exe when it attempts to execute EntVU...
Mcafee Common Management Agent 3.5
Mcafee Virusscan Enterprise 8.0i
1 EDB exploit
4.4
CVSSv2
CVE-2014-1838
The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons prior to 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.
Opensuse Opensuse 13.1
Opensuse Opensuse 12.3
Logilab Logilab-common
4.4
CVSSv2
CVE-2014-1839
The Execute class in shellutils in logilab-commons prior to 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Logilab Logilab-common
4.9
CVSSv2
CVE-2019-2419
Vulnerability in the PeopleSoft Enterprise CC Common Application Objects component of Oracle PeopleSoft Products (subcomponent: Form and Approval Builder). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network ...
Oracle Peoplesoft Enterprise Cost Center Common Application Objects 9.2
5.5
CVSSv2
CVE-2021-35543
Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Activity Guide Composer). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP ...
Oracle Peoplesoft Enterprise Cost Center Common Application Objects 9.2
NA
CVE-2023-22090
Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Events & Notifications). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HT...
Oracle Peoplesoft Enterprise Cost Center Common Application Objects 9.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »