Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
operations agent vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-4087
IBM Spectrum Protect Servers 7.1 and 8.1 and Storage Agents are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by servers and storage agents in response to specifically crafted communication exchanges. By sending an overly long request, a remote a...
Ibm Spectrum Protect Operations Center
9.8
CVSSv3
CVE-2019-10149
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Exim Exim
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
3 EDB exploits
14 Github repositories
2 Articles
9.8
CVSSv3
CVE-2018-6789
An issue exists in the base64d function in the SMTP listener in Exim prior to 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
Exim Exim
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 16.04
2 EDB exploits
7 Github repositories
1 Article
9.8
CVSSv3
CVE-2016-6807
Custom commands may be executed on Ambari Agent (2.4.x, prior to 2.4.2) hosts without authorization, leading to unauthorized access to operations that may affect the underlying system. Such operations are invoked by the Ambari Agent process on Ambari Agent hosts, as the user exec...
Apache Ambari 2.4.1
Apache Ambari 2.4.0
9.8
CVSSv3
CVE-2016-6330
The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote malicious users to execute arbitrary code via a crafted HTTP request, related to message deserialization. NOTE: this vulnerability e...
Redhat Jboss Operations Network 3.0
Redhat Jboss Operations Network 3.3.4
Redhat Jboss Operations Network 3.3.5
Redhat Jboss Operations Network 3.1
Redhat Jboss Operations Network 3.3.2
Redhat Jboss Operations Network 3.2.0
Redhat Jboss Operations Network 3.2.2
Redhat Jboss Operations Network 3.0.1
Redhat Jboss Operations Network 3.2.3
Redhat Jboss Operations Network 3.1.2
Redhat Jboss Operations Network 3.3.1
Redhat Jboss Operations Network 3.2.1
Redhat Jboss Operations Network 3.1.1
Redhat Jboss Operations Network 3.3.6
Redhat Jboss Operations Network 3.1.4
Redhat Jboss Operations Network 3.3.3
9
CVSSv3
CVE-2021-45046
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with...
Apache Log4j 2.0
Apache Log4j
Intel Oneapi -
Intel Audio Development Kit -
Intel Datacenter Manager -
Intel System Debugger -
Intel Secure Device Onboard -
Intel Sensor Solution Firmware Development Kit -
Intel Computer Vision Annotation Tool -
Intel Genomics Kernel Library -
Intel System Studio -
Siemens Sppa-t3000 Ses3000 Firmware
Siemens Logo\\! Soft Comfort
Siemens Spectrum Power 4 4.70
Siemens Spectrum Power 4
Siemens Siveillance Control Pro
Siemens Energyip Prepay 3.7
Siemens Energyip Prepay 3.8
Siemens Siveillance Identity 1.6
Siemens Siveillance Identity 1.5
Siemens Siveillance Command
Siemens Sipass Integrated 2.85
195 Github repositories
9 Articles
8.8
CVSSv3
CVE-2022-42898
PAC parsing in MIT Kerberos 5 (aka krb5) prior to 1.19.4 and 1.20.x prior to 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and...
Mit Kerberos 5
Mit Kerberos 5 1.20
Heimdal Project Heimdal
Samba Samba
8.8
CVSSv3
CVE-2016-1000104
A security Bypass vulnerability exists in the FcgidPassHeader Proxy in mod_fcgid through 2016-07-07.
Apache Mod Fcgid
Opensuse Leap 42.1
Opensuse Opensuse 13.2
8.2
CVSSv3
CVE-2022-36899
Jenkins Compuware ISPW Operations Plugin 1.0.8 and previous versions does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.
Jenkins Compuware Ispw Operations
8.1
CVSSv3
CVE-2021-21686
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and previous versions, LTS 2.303.2 and previous versions do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
Jenkins Jenkins
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »