Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openssl vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2022-29505
Due to build misconfiguration in openssl dependency, LINE for Windows prior to 7.8 is vulnerable to DLL injection that could lead to privilege escalation.
Linecorp Line
7.8
CVSSv3
CVE-2022-24048
MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local malicious users to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw ...
Mariadb Mariadb
Mariadb Mariadb 10.8.0
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Fedoraproject Fedora 36
7.8
CVSSv3
CVE-2022-24050
MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local malicious users to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within...
Mariadb Mariadb
Mariadb Mariadb 10.8.0
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Fedoraproject Fedora 36
7.8
CVSSv3
CVE-2022-24051
MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local malicious users to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within ...
Mariadb Mariadb
Mariadb Mariadb 10.8.0
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Fedoraproject Fedora 36
7.8
CVSSv3
CVE-2022-24052
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local malicious users to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw e...
Mariadb Mariadb
Mariadb Mariadb 10.8.0
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Fedoraproject Fedora 36
7.8
CVSSv3
CVE-2021-32592
An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an malicious user to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the sear...
Fortinet Forticlient
Fortinet Forticlient 7.0.0
Fortinet Forticlient Enterprise Management Server
Fortinet Forticlient Enterprise Management Server 7.0.0
7.8
CVSSv3
CVE-2021-42101
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local malicious user to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system...
Trendmicro Apex One 2019
7.8
CVSSv3
CVE-2021-42102
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service agents could allow a local malicious user to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target...
Trendmicro Apex One 2019
7.8
CVSSv3
CVE-2021-42103
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local malicious user to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system...
Trendmicro Apex One 2019
7.8
CVSSv3
CVE-2021-25698
The OpenSSL component of the Teradici PCoIP Standard Agent prior to version 21.07.0 was compiled without the no-autoload-config option, which allowed an malicious user to elevate to the privileges of the running process via placing a specially crafted dll in a build configuration...
Teradici Pcoip Standard Agent
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »