Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
patrik lantz vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-19731
Roxy Fileman 1.4.5 for .NET is vulnerable to path traversal. A remote attacker can write uploaded files to arbitrary locations via the RENAMEFILE action. This can be leveraged for code execution by uploading a specially crafted Windows shortcut file and writing the file to the St...
Roxyfileman Roxy Fileman 1.4.5
NA
CVE-2012-5958
Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) prior to 1.6.18 allows remote malicious users to execute arbitrary code via a UDP p...
Libupnp Project Libupnp 1.6.12
Libupnp Project Libupnp 1.6.11
Libupnp Project Libupnp 1.6.4
Libupnp Project Libupnp 1.6.3
Libupnp Project Libupnp 1.4.3
Libupnp Project Libupnp 1.4.2
Libupnp Project Libupnp 1.6.16
Libupnp Project Libupnp 1.6.15
Libupnp Project Libupnp 1.6.8
Libupnp Project Libupnp 1.6.7
Libupnp Project Libupnp 1.6.0
Libupnp Project Libupnp 1.4.7
Libupnp Project Libupnp 1.6.14
Libupnp Project Libupnp 1.6.13
Libupnp Project Libupnp 1.6.6
Libupnp Project Libupnp 1.6.5
Libupnp Project Libupnp 1.4.6
Libupnp Project Libupnp 1.4.5
Libupnp Project Libupnp 1.4.4
Libupnp Project Libupnp
Libupnp Project Libupnp 1.6.10
Libupnp Project Libupnp 1.6.9
1 EDB exploit
1 Github repository
8.8
CVSSv3
CVE-2017-13772
Multiple stack-based buffer overflows in TP-Link WR940N WiFi routers with hardware version 4 allow remote authenticated users to execute arbitrary code via the (1) ping_addr parameter to PingIframeRpm.htm or (2) dnsserver2 parameter to WanStaticIpV6CfgRpm.htm.
Tp-link Wr940n Firmware -
1 EDB exploit
1 Github repository
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started