Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
grep vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv2
CVE-2012-5667
Multiple integer overflows in GNU Grep prior to 2.11 might allow context-dependent malicious users to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
Gnu Grep 2.4.2
Gnu Grep 2.5.1
Gnu Grep 2.2
Gnu Grep 2.4
Gnu Grep
Gnu Grep 2.9
Gnu Grep 2.6.1
Gnu Grep 2.6.3
Gnu Grep 2.5.4
Gnu Grep 2.4.1
Gnu Grep 2.7
Gnu Grep 2.3
Gnu Grep 2.5.3
Gnu Grep 2.6.2
Gnu Grep 2.5
Gnu Grep 2.8
Gnu Grep 2.6
1 EDB exploit
10
CVSSv2
CVE-2019-1867
A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote malicious user to bypass authentication on the REST API. The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability...
Cisco Elastic Services Controller
4.6
CVSSv2
CVE-2001-0573
lsfs in AIX 4.x allows a local user to gain additional privileges by creating Trojan horse programs named (1) grep or (2) lslv in a certain directory that is under the user's control, which cause lsfs to access the programs in that directory.
Ibm Aix 4
6.8
CVSSv2
CVE-2013-7069
ack 2.00 up to and including 2.11_02 allows remote malicious users to execute arbitrary code via a (1) --pager, (2) --regex, or (3) --output option in a .ackrc file in a directory to be searched.
Beyondgrep Ack 2.05 01
Beyondgrep Ack 2.04
Beyondgrep Ack 2.10
Beyondgrep Ack 2.08
Beyondgrep Ack 2.06
Beyondgrep Ack 2.11 01
Beyondgrep Ack 2.11
Beyondgrep Ack 2.11 02
Beyondgrep Ack 2.02
Beyondgrep Ack 2.00
7.5
CVSSv2
CVE-2018-13043
scripts/grep-excuses.pl in Debian devscripts up to and including 2.18.3 allows code execution through unsafe YAML loading because YAML::Syck is used without a configuration that prevents unintended blessing.
Debian Devscripts
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
NA
CVE-2023-20012
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the im...
Cisco Nexus 93180yc-fx3s Firmware -
Cisco Nexus 93180yc-fx3 Firmware -
Cisco Ucs Central Software
Cisco Ucs 6536 Firmware -
Cisco Ucs 64108 Firmware -
Cisco Ucs 6454 Firmware -
5
CVSSv2
CVE-2018-0239
A vulnerability in the egress packet processing functionality of the Cisco StarOS operating system for Cisco Aggregation Services Router (ASR) 5700 Series devices and Virtualized Packet Core (VPC) System Software could allow an unauthenticated, remote malicious user to cause an i...
Cisco Staros 21.0.v0.65819
Cisco Staros 21.0.v4
Cisco Staros 21.1.v6
Cisco Staros 21.3.1
Cisco Staros 21.4.0
6.8
CVSSv2
CVE-2019-1963
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, remote malicious user to cause the SNMP application on an affected device to restart unexpectedly. The vulnerabili...
Cisco Nx-os
Cisco Fx-os
9
CVSSv2
CVE-2020-13695
In QuickBox Community Edition up to and including 2.5.5 and Pro Edition up to and including 2.1.8, the local www-data user has sudo privileges to execute grep as root without a password, which allows an malicious user to obtain sensitive information via a grep of a /root/*.db or ...
Quickbox Quickbox
5
CVSSv2
CVE-2018-20796
In the GNU C Library (aka glibc or libc6) up to and including 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\\1\\1|t1|\\\2537)+' in grep.
Gnu Glibc
Netapp Steelstore Cloud Integrated Storage -
Netapp Ontap Select Deploy Administration Utility -
Netapp Cloud Backup
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »