Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
document server vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2017-12635
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB prior to 1.7.0 and 2.x prior to 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including ...
Apache Couchdb
Apache Couchdb 2.0.0
2 EDB exploits
6 Github repositories
10
CVSSv2
CVE-2016-4328
MEDHOST Perioperative Information Management System (aka PIMS or VPIMS) prior to 2015R1 has hardcoded credentials, which makes it easier for remote malicious users to obtain sensitive information via direct requests to the application database server.
Medhost Perioperative Information Management System -
1 Article
10
CVSSv2
CVE-2015-7912
The Ice Faces servlet in ag_server_service.exe in the AggreGate Server Service in Tibbo AggreGate prior to 5.30.06 allows remote malicious users to upload and execute arbitrary Java code via a crafted XML document.
Tibbo Aggregate
10
CVSSv2
CVE-2015-5911
Multiple unspecified vulnerabilities in Twisted in Wiki Server in Apple OS X Server prior to 5.0.3 allow malicious users to have an unknown impact via an XML document.
Apple Mac Os X Server
10
CVSSv2
CVE-2014-0703
Cisco Wireless LAN Controller (WLC) devices 7.4 prior to 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote malicious users to bypass intended access restrictions by connecting to an Aironet access ...
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller
10
CVSSv2
CVE-2013-3573
HP Insight Diagnostics 9.4.0.4710 allows remote malicious users to conduct unspecified injection attacks via unknown vectors.
Hp Insight Diagnostics 9.4.0.4710
10
CVSSv2
CVE-2013-1476
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and previous versions, and OpenJDK 6 and 7, allows remote malicious users to affect confidentiality, integrity...
Oracle Jre 1.7.0
Oracle Jdk 1.7.0
Sun Jre 1.6.0
Oracle Jre 1.6.0
Sun Jdk 1.6.0
Oracle Jdk 1.6.0
Sun Jre 1.5.0
Oracle Jre 1.5.0
Sun Jdk 1.5.0
Oracle Jdk 1.5.0
Sun Jre 1.4.2 26
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jre 1.4.2 16
Sun Jre 1.4.2 24
Sun Jre 1.4.2 4
Sun Jre 1.4.2 2
Sun Jre 1.4.2 19
Sun Jre 1.4.2 25
Sun Jre 1.4.2 15
Sun Jre 1.4.2 13
Sun Jre 1.4.2 1
10
CVSSv2
CVE-2013-1478
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and previous versions, and OpenJDK 6 and 7, allows remote malicious users to affect confidentiality, integrity...
Oracle Jre 1.7.0
Oracle Jdk 1.7.0
Sun Jre 1.6.0
Oracle Jre 1.6.0
Sun Jdk 1.6.0
Oracle Jdk 1.6.0
Sun Jre 1.5.0
Oracle Jre 1.5.0
Sun Jdk 1.5.0
Oracle Jdk 1.5.0
Sun Jre 1.4.2 26
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jre 1.4.2 16
Sun Jre 1.4.2 24
Sun Jre 1.4.2 4
Sun Jre 1.4.2 2
Sun Jre 1.4.2 19
Sun Jre 1.4.2 25
Sun Jre 1.4.2 15
Sun Jre 1.4.2 13
Sun Jre 1.4.2 1
10
CVSSv2
CVE-2013-1480
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and previous versions, and OpenJDK 6 and 7, allows remote malicious users to affect confidentiality, integrity...
Oracle Jre 1.7.0
Oracle Jdk 1.7.0
Sun Jre 1.6.0
Oracle Jre 1.6.0
Sun Jdk 1.6.0
Oracle Jdk 1.6.0
Sun Jre 1.5.0
Oracle Jre 1.5.0
Sun Jdk 1.5.0
Oracle Jdk 1.5.0
Sun Jre 1.4.2 26
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jre 1.4.2 16
Sun Jre 1.4.2 24
Sun Jre 1.4.2 4
Sun Jre 1.4.2 2
Sun Jre 1.4.2 19
Sun Jre 1.4.2 25
Sun Jre 1.4.2 15
Sun Jre 1.4.2 13
Sun Jre 1.4.2 1
10
CVSSv2
CVE-2013-1481
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and previous versions allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors rela...
Sun Jre 1.6.0
Oracle Jre 1.6.0
Sun Jdk 1.6.0
Oracle Jdk 1.6.0
Sun Jre 1.5.0
Oracle Jre 1.5.0
Sun Jdk 1.5.0
Oracle Jdk 1.5.0
Sun Jre 1.4.2 26
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jre 1.4.2 16
Sun Jre 1.4.2 24
Sun Jre 1.4.2 4
Sun Jre 1.4.2 2
Sun Jre 1.4.2 19
Sun Jre 1.4.2 25
Sun Jre 1.4.2 15
Sun Jre 1.4.2 13
Sun Jre 1.4.2 1
Sun Jre 1.4.2 8
Sun Jre 1.4.2 31
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »