Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
grep vulnerabilities and exploits
(subscribe to this query)
10
CVSSv3
CVE-2019-1867
A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote malicious user to bypass authentication on the REST API. The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability...
Cisco Elastic Services Controller
9.8
CVSSv3
CVE-2021-36260
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
Hikvision Ds-2cd2026g2-iu\\/sl Firmware -
Hikvision Ds-2cd2046g2-iu\\/sl Firmware -
Hikvision Ds-2cd2066g2-i\\(u\\) Firmware -
Hikvision Ds-2cd2066g2-iu\\/sl Firmware -
Hikvision Ds-2cd2086g2-i\\(u\\) Firmware -
Hikvision Ds-2cd2086g2-iu\\/sl Firmware -
Hikvision Ds-2cd2166g2-i\\(su\\) Firmware -
Hikvision Ds-2cd2186g2-i\\(su\\) Firmware -
Hikvision Ds-2cd2186g2-isu Firmware -
Hikvision Ds-2cd2326g2-isu\\/sl Firmware -
Hikvision Ds-2cd2346g2-isu\\/sl Firmware -
Hikvision Ds-2cd2366g2-i\\(u\\) Firmware -
Hikvision Ds-2cd2366g2-isu\\/sl Firmware -
Hikvision Ds-2cd2386g2-i\\(u\\) Firmware -
Hikvision Ds-2cd2386g2-isu\\/sl Firmware -
Hikvision Ds-2cd2426g2-i Firmware -
Hikvision Ds-2cd2446g2-i Firmware -
Hikvision Ds-2cd2526g2-i\\(s\\) Firmware -
Hikvision Ds-2cd2526g2-is Firmware -
Hikvision Ds-2cd2546g2-i\\(s\\) Firmware -
Hikvision Ds-2cd2566g2-i\\(s\\) Firmware -
Hikvision Ds-2cd2586g2-i\\(s\\) Firmware -
1 Metasploit module
31 Github repositories
2 Articles
9.8
CVSSv3
CVE-2018-13043
scripts/grep-excuses.pl in Debian devscripts up to and including 2.18.3 allows code execution through unsafe YAML loading because YAML::Syck is used without a configuration that prevents unintended blessing.
Debian Devscripts
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
8.8
CVSSv3
CVE-2022-20824
A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent malicious user to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. This ...
Cisco Mds 9506 Firmware -
Cisco Mds 9513 Firmware -
Cisco Mds 9706 Firmware -
Cisco Mds 9710 Firmware -
Cisco Mds 9718 Firmware -
Cisco Nexus 1000v Firmware -
Cisco Nexus 3016 Firmware -
Cisco Nexus 3016q Firmware -
Cisco Nexus 3048 Firmware -
Cisco Nexus 3064 Firmware -
Cisco Nexus 3064-32t Firmware -
Cisco Nexus 3064-t Firmware -
Cisco Nexus 3064-x Firmware -
Cisco Nexus 3064t Firmware -
Cisco Nexus 3064x Firmware -
Cisco Nexus 3100 Firmware -
Cisco Nexus 3100-v Firmware -
Cisco Nexus 3100-z Firmware -
Cisco Nexus 3100v Firmware -
Cisco Nexus 31108pc-v Firmware -
Cisco Nexus 31108pv-v Firmware -
Cisco Nexus 31108tc-v Firmware -
8.8
CVSSv3
CVE-2020-13851
Artica Pandora FMS 7.44 allows remote command execution via the events feature.
Pandorafms Pandora Fms 7.44
1 Metasploit module
1 Github repository
7.5
CVSSv3
CVE-2023-26031
Relative library resolution in linux container-executor binary in Apache Hadoop 3.3.1-3.3.4 on Linux allows local user to gain root privileges. If the YARN cluster is accepting work from remote (authenticated) users, this MAY permit remote users to gain root privileges. Hadoop 3....
Apache Hadoop
7.5
CVSSv3
CVE-2022-22211
A limitless resource allocation vulnerability in FPC resources of Juniper Networks Junos OS Evolved on PTX Series allows an unprivileged malicious user to cause Denial of Service (DoS). Continuously polling the SNMP jnxCosQstatTable causes the FPC to run out of GUID space, causin...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
7.5
CVSSv3
CVE-2022-20767
A vulnerability in the Snort rule evaluation function of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of the DN...
Cisco Firepower Threat Defense 7.1.0
Cisco Firepower Threat Defense
7.5
CVSSv3
CVE-2019-15947
In Bitcoin Core 0.18.0, bitcoin-qt stores wallet.dat data unencrypted in memory. Upon a crash, it may dump a core file. If a user were to mishandle a core file, an attacker can reconstruct the user's wallet.dat file, including their private keys, via a grep "6231 0500&q...
Bitcoin Bitcoin Core 0.18.0
7.5
CVSSv3
CVE-2019-9192
In the GNU C Library (aka glibc or libc6) up to and including 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\1\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that t...
Gnu Glibc
4 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »