Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
amazon aws project amazon aws vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2015-3373
The Amazon AWS module prior to 7.x-1.3 for Drupal uses the base URL and AWS access key to generate the access token, which makes it easier for remote malicious users to guess the token value and create backups via a crafted URL.
Amazon Aws Project Amazon Aws
668
VMScore
CVE-2021-38384
Serverless Offline 8.0.0 returns a 403 HTTP status code for a route that has a trailing / character, which might cause a developer to implement incorrect access control, because the actual behavior within the Amazon AWS environment is a 200 HTTP status code (i.e., possibly greate...
Serverless Offline Project Serverless Offline 8.0.0
668
VMScore
CVE-2022-24840
django-s3file is a lightweight file upload input for Django and Amazon S3 . In versions before 5.5.1 it was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. If the `AWS_LOCATION` setting was set, traversal was limited to that location onl...
Django-s3file Project Django-s3file
392
VMScore
CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c...
Polkit Project Polkit 0.115
Debian Debian Linux 8.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
NA
CVE-2024-28056
Amazon AWS Amplify CLI prior to 12.10.1 incorrectly configures the role trust policy of IAM roles associated with Amplify projects. When the Authentication component is removed from an Amplify project, a Condition property is removed but "Effect":"Allow" remai...
NA
CVE-2023-48795
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH prior to 9.6 and other products, allows remote malicious users to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may conseque...
Openbsd Openssh
Putty Putty
Filezilla-project Filezilla Client
Microsoft Powershell
Panic Transmit 5
Panic Nova
Roumenpetrov Pkixssh
Winscp Winscp
Bitvise Ssh Client
Bitvise Ssh Server
Lancom-systems Lcos
Lancom-systems Lcos Fx -
Lancom-systems Lcos Lx -
Lancom-systems Lcos Sx 5.20
Lancom-systems Lcos Sx 4.20
Lancom-systems Lanconfig -
Vandyke Securecrt
Libssh Libssh
Net-ssh Net-ssh 7.2.0
Ssh2 Project Ssh2
Proftpd Proftpd
Freebsd Freebsd
9 Github repositories
1 Article
430
VMScore
CVE-2017-5754
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
Intel Core I7 4900mq
Intel Core I7 4910mq
Intel Core I7 4950hq
Intel Core I7 4960hq
Intel Core I7 4980hq
Intel Core I7 4800mq
Intel Core I7 4810mq
Intel Core I7 4850hq
Intel Core I7 4860hq
Intel Core I7 4870hq
Intel Core I7 4700ec
Intel Core I7 4700eq
Intel Core I7 4700hq
Intel Core I7 4700mq
Intel Core I7 4702ec
Intel Core I7 4702hq
Intel Core I7 4702mq
Intel Core I7 4710hq
Intel Core I7 4710mq
Intel Core I7 4712hq
Intel Core I7 4712mq
Intel Core I7 4720hq
41 Github repositories
8 Articles
210
VMScore
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Core I7 4900mq
Intel Core I7 4910mq
Intel Core I7 4950hq
Intel Core I7 4960hq
Intel Core I7 4980hq
Intel Core I7 4800mq
Intel Core I7 4810mq
Intel Core I7 4850hq
Intel Core I7 4860hq
Intel Core I7 4870hq
Intel Core I7 4700ec
Intel Core I7 4700eq
Intel Core I7 4700hq
Intel Core I7 4700mq
Intel Core I7 4702ec
Intel Core I7 4702hq
Intel Core I7 4702mq
Intel Core I7 4710hq
Intel Core I7 4710mq
Intel Core I7 4712hq
Intel Core I7 4712mq
Intel Core I7 4720hq
1 EDB exploit
49 Github repositories
9 Articles
488
VMScore
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Core I7 4900mq
Intel Core I7 4910mq
Intel Core I7 4950hq
Intel Core I7 4960hq
Intel Core I7 4980hq
Intel Core I7 4800mq
Intel Core I7 4810mq
Intel Core I7 4850hq
Intel Core I7 4860hq
Intel Core I7 4870hq
Intel Core I7 4700ec
Intel Core I7 4700eq
Intel Core I7 4700hq
Intel Core I7 4700mq
Intel Core I7 4702ec
Intel Core I7 4702hq
Intel Core I7 4702mq
Intel Core I7 4710hq
Intel Core I7 4710mq
Intel Core I7 4712hq
Intel Core I7 4712mq
Intel Core I7 4720hq
1 EDB exploit
42 Github repositories
9 Articles
NA
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Ietf Http 2.0
Nghttp2 Nghttp2
Netty Netty
Envoyproxy Envoy 1.27.0
Envoyproxy Envoy 1.26.4
Envoyproxy Envoy 1.25.9
Envoyproxy Envoy 1.24.10
Eclipse Jetty
Caddyserver Caddy
Golang Http2
Golang Go
Golang Networking
F5 Big-ip Analytics
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Global Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Domain Name System
F5 Big-ip Application Security Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager
35 Github repositories
2 Articles
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started