Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
information technology vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2017-2128
Security guide for website operators allows remote malicious users to execute arbitrary OS commands via specially crafted saved data.
Information-technology Promotion Agency Introduction To Safe Website Operation -
5
CVSSv2
CVE-2006-2437
The viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote malicious users to obtain the source code for file under the web root via the file parameter.
Caucho Technology Resin 3.0.18
Caucho Technology Resin 3.0.17
1 EDB exploit
5
CVSSv2
CVE-2002-1990
Resin 2.0.5 up to and including 2.1.2 allows remote malicious users to reveal physical path information via a URL request for the example Java class file HelloServlet.
Caucho Technology Resin 2.1.2
Caucho Technology Resin 2.0
Caucho Technology Resin 2.1.1
10
CVSSv2
CVE-2017-5689
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged netwo...
Intel Active Management Technology Firmware 6.1
Intel Active Management Technology Firmware 6.2
Intel Active Management Technology Firmware 10.0
Intel Active Management Technology Firmware 11.0
Intel Active Management Technology Firmware 6.0
Intel Active Management Technology Firmware 9.0
Intel Active Management Technology Firmware 9.1
Intel Active Management Technology Firmware 9.5
Intel Active Management Technology Firmware 7.0
Intel Active Management Technology Firmware 7.1
Intel Active Management Technology Firmware 11.5
Intel Active Management Technology Firmware 11.6
Intel Active Management Technology Firmware 8.0
Intel Active Management Technology Firmware 8.1
1 EDB exploit
2 Metasploit modules
1 Nmap script
35 Github repositories
3 Articles
10
CVSSv2
CVE-2015-6014
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4808, CVE-2015-6013, CV...
Oracle Outside In Technology 8.5.0
Oracle Outside In Technology 8.5.2
Oracle Outside In Technology 8.5.1
10
CVSSv2
CVE-2015-6015
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4808, CVE-2015-6013, CV...
Oracle Outside In Technology 8.5.1
Oracle Outside In Technology 8.5.0
Oracle Outside In Technology 8.5.2
10
CVSSv2
CVE-2015-6013
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4808, CVE-2015-6014, CV...
Oracle Outside In Technology 8.5.0
Oracle Outside In Technology 8.5.2
Oracle Outside In Technology 8.5.1
5
CVSSv2
CVE-2005-2956
ATutor 1.5.1, and possibly earlier versions, stores temporary chat logs under the web document root with insufficient access control and predictable filenames, which allows remote malicious users to obtain user chat conversations via direct requests to those files.
Adaptive Technology Resource Centre Atutor 1.5.1
1 EDB exploit
5
CVSSv2
CVE-2000-0925
The default installation of SmartWin CyberOffice Shopping Cart 2 (aka CyberShop) installs the _private directory with world readable permissions, which allows remote malicious users to obtain sensitive information.
Smartwin Technology Cyberoffice Shopping Cart 2.0
1 EDB exploit
5.8
CVSSv2
CVE-2018-18223
Open Design Alliance Drawings SDK 2019Update1 has a vulnerability during the reading of malformed files, allowing malicious users to obtain sensitive information from process memory or cause a crash.
Opendesign Drawings Sdk 2019
Oracle Outside In Technology 8.5.4
Oracle Outside In Technology 8.5.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »