Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
audit vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-8813
graph_realtime.php in Cacti 1.2.8 allows remote malicious users to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
Cacti Cacti 1.2.8
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opmantek Open-audit 3.3.1
Opensuse Suse Package Hub
Debian Debian Linux 10.0
2 EDB exploits
5 Github repositories
NA
CVE-2015-5408
HP CentralView Fraud Risk Management 11.1, 11.2, and 11.3; CentralView Revenue Leakage Control 4.1, 4.2, and 4.3; CentralView Dealer Performance Audit 2.0 and 2.1; CentralView Credit Risk Control 2.1, 2.2, and 2.3; CentralView Roaming Fraud Control 2.1, 2.2, and 2.3; and CentralV...
Hp Centralview Fraud Risk Management 11.2
Hp Centralview Fraud Risk Management 11.3
Hp Centralview Fraud Risk Management 11.1
Hp Centralview Roaming Fraud Control 2.1
Hp Centralview Roaming Fraud Control 2.2
Hp Centralview Roaming Fraud Control 2.3
Hp Centralview Credit Risk Control 2.2
Hp Centralview Credit Risk Control 2.3
Hp Centralview Credit Risk Control 2.1
Hp Centralview Subscription Fraud Prevention 2.0
Hp Centralview Subscription Fraud Prevention 2.1
Hp Centralview Dealer Performance Audit 2.0
Hp Centralview Dealer Performance Audit 2.1
Hp Centralview Revenue Leakage Control 4.1
Hp Centralview Revenue Leakage Control 4.2
Hp Centralview Revenue Leakage Control 4.3
NA
CVE-2015-5407
HP CentralView Fraud Risk Management 11.1, 11.2, and 11.3; CentralView Revenue Leakage Control 4.1, 4.2, and 4.3; CentralView Dealer Performance Audit 2.0 and 2.1; CentralView Credit Risk Control 2.1, 2.2, and 2.3; CentralView Roaming Fraud Control 2.1, 2.2, and 2.3; and CentralV...
Hp Centralview Revenue Leakage Control 4.2
Hp Centralview Revenue Leakage Control 4.3
Hp Centralview Revenue Leakage Control 4.1
Hp Centralview Fraud Risk Management 11.2
Hp Centralview Fraud Risk Management 11.3
Hp Centralview Fraud Risk Management 11.1
Hp Centralview Subscription Fraud Prevention 2.1
Hp Centralview Subscription Fraud Prevention 2.0
Hp Centralview Dealer Performance Audit 2.0
Hp Centralview Dealer Performance Audit 2.1
Hp Centralview Roaming Fraud Control 2.1
Hp Centralview Roaming Fraud Control 2.2
Hp Centralview Roaming Fraud Control 2.3
Hp Centralview Credit Risk Control 2.1
Hp Centralview Credit Risk Control 2.2
Hp Centralview Credit Risk Control 2.3
NA
CVE-2015-5406
HP CentralView Fraud Risk Management 11.1, 11.2, and 11.3; CentralView Revenue Leakage Control 4.1, 4.2, and 4.3; CentralView Dealer Performance Audit 2.0 and 2.1; CentralView Credit Risk Control 2.1, 2.2, and 2.3; CentralView Roaming Fraud Control 2.1, 2.2, and 2.3; and CentralV...
Hp Centralview Revenue Leakage Control 4.3
Hp Centralview Revenue Leakage Control 4.1
Hp Centralview Revenue Leakage Control 4.2
Hp Centralview Credit Risk Control 2.1
Hp Centralview Credit Risk Control 2.2
Hp Centralview Credit Risk Control 2.3
Hp Centralview Subscription Fraud Prevention 2.0
Hp Centralview Subscription Fraud Prevention 2.1
Hp Centralview Dealer Performance Audit 2.0
Hp Centralview Dealer Performance Audit 2.1
Hp Centralview Roaming Fraud Control 2.2
Hp Centralview Roaming Fraud Control 2.3
Hp Centralview Roaming Fraud Control 2.1
Hp Centralview Fraud Risk Management 11.2
Hp Centralview Fraud Risk Management 11.3
Hp Centralview Fraud Risk Management 11.1
NA
CVE-2005-3653
Heap-based buffer overflow in the iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway prior to 4.0.051230, allows remote malicious users to execute arbitrary code via an HTTP request with a negative Content-Length field.
Broadcom Brightstor Arcserve Backup 11.1
Broadcom Brightstor Arcserve Backup 11.5
Ca Brightstor Enterprise Backup 10.5
Broadcom Brightstor Portal 11.1
Broadcom Brightstor Storage Resource Manager 6.4
Broadcom Etrust Admin 8.1
Ca Etrust Directory 8.1 Web Components
Broadcom Etrust Identity Minder 8.0
Ca Unicenter Exchange Management Console 11.0
Ca Unicenter Management 11.0
Ca Unicenter Service Fulfillment 11.0
Broadcom Unicenter Service Fulfillment 2.2
Broadcom Brightstor Arcserve Backup Laptops Desktops 11.0
Broadcom Brightstor Arcserve Backup Laptops Desktops 11.1
Broadcom Brightstor San Manager 11.5
Broadcom Brightstor Storage Resource Manager 11.1
Broadcom Etrust Audit Aries 8.0
Broadcom Etrust Audit Irecorder 1.5
Ca Unicenter Application Performance Monitor 11.0
Ca Unicenter Application Server Managment 11.0
Broadcom Unicenter Asset Portfolio Management 11.0
Ca Unicenter Service Catalog Fulfillment Accounting 11.0
3.4
CVSSv3
CVE-2020-35501
A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
NA
CVE-2015-8503
SecurityCenter contains a flaw that allows a stored cross-site scripting (XSS) attack. This flaw exists because the application does not ensure that uploaded .audit files are validated before being rendered on the scan results page. This may allow a remote authenticated attacker ...
NA
CVE-2015-1026
Multiple cross-site scripting (XSS) vulnerabilities in ZOHO ManageEngine ADManager Plus prior to 6.2 Build 6270 allow remote malicious users to inject arbitrary web script or HTML via the (1) technicianSearchText parameter to the Help Desk Technician page or (2) rolesSearchText p...
Zohocorp Manageengine Admanager Plus
NA
CVE-2011-3337
eEye Audit ID 2499 in eEye Digital Security Audits 2406 through 2423 for eEye Retina Network Security Scanner on HP-UX, IRIX, and Solaris allows local users to gain privileges via a Trojan horse gauntlet program in an arbitrary directory under /usr/local/.
Eeye Retina Network Security Scanner
Eeye Digital Security Audits 2423
Eeye Digital Security Audits 2406
NA
CVE-2007-0001
The file watch implementation in the audit subsystem (auditctl -w) in the Red Hat Enterprise Linux (RHEL) 4 kernel 2.6.9 allows local users to cause a denial of service (kernel panic) by replacing a watched file, which does not cause the watch on the old inode to be dropped.
Redhat Enterprise Linux 4.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »