Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
reflection vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2011-1148
Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and previous versions allows context-dependent malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.
Php Php 5.3.0
Php Php 4.0.3
Php Php 4.0.4
Php Php 4.0
Php Php 4.1.0
Php Php 4.2.2
Php Php 4.2.3
Php Php 4.3.2
Php Php 4.3.3
Php Php 4.4.1
Php Php 4.4.2
Php Php 4.4.9
Php Php 3.0.11
Php Php 3.0.18
Php Php 3.0.4
Php Php 3.0.8
Php Php 3.0.5
Php Php 5.3.5
Php Php
Php Php 4.0.1
Php Php 4.0.2
Php Php 4.2.1
668
VMScore
CVE-2005-3905
Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and previous versions, 1.4.2_08 and previous versions, and JDK and JRE 5.0 Update 3 and previous versions allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbit...
Sun Jdk 1.3.0 05
Sun Jdk 1.3.1 03
Sun Jdk 1.3.1 06
Sun Jdk 1.3.1 07
Sun Jdk 1.3.1 09
Sun Jdk 1.3.0 02
Sun Jdk 1.3.1 02
Sun Jdk 1.3.1 08
Sun Jdk 1.3.1 11
Sun Jdk 1.3.1 14
Sun Jdk 1.4.0 01
Sun Jdk 1.4.0 02
Sun Jdk 1.4.0 4
Sun Jdk 1.4.1 02
Sun Jdk 1.4.2 01
Sun Jdk 1.4.2 02
Sun Jdk 1.4.2 05
Sun Jdk 1.5.0 03
Sun Jdk 1.3.1 01
Sun Jdk 1.3.1 04
Sun Jdk 1.3.1 10
Sun Jdk 1.3.1 12
668
VMScore
CVE-2005-3906
Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and previous versions and JDK and JRE 5.0 Update 3 and previous versions allow remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary applications via u...
Sun Jdk 1.3.1 01
Sun Jdk 1.3.1 03
Sun Jdk 1.3.1 04
Sun Jdk 1.3.1 07
Sun Jdk 1.3.1 10
Sun Jdk 1.3.1 12
Sun Jdk 1.3.1 13
Sun Jdk 1.3.1 15
Sun Jdk 1.3
Sun Jdk 1.4.0 03
Sun Jdk 1.4.1
Sun Jdk 1.4.1 01
Sun Jdk 1.4.1 03
Sun Jdk 1.4.2
Sun Jdk 1.4.2 03
Sun Jdk 1.4.2 04
Sun Jdk 1.4.2 08
Sun Jdk 1.4
Sun Jre 1.3.0
Sun Jre 1.3.1
Sun Jre 1.4.2 5
Sun Jre 1.4.2 6
668
VMScore
CVE-2005-2770
WRQ Reflection for Secure IT Windows Server 6.0 (formerly known as F-Secure SSH server) does not properly handle when the Windows Administrator or Guest accounts are renamed after SSH key authentication has been configured, which allows remote malicious users to use the original ...
Wrq Wrq Reflection For Secure It Windows Server 6.0
645
VMScore
CVE-2011-2202
The rfc1867_post_handler function in main/rfc1867.c in PHP prior to 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote malicious users to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, v...
Php Php 5.3.0
Php Php 4.0.4
Php Php 4.0.5
Php Php 4.0
Php Php 4.1.0
Php Php 4.2.2
Php Php 4.2.3
Php Php 4.3.3
Php Php 4.3.4
Php Php 4.4.1
Php Php 4.4.2
Php Php 3.0.11
Php Php 3.0.10
Php Php 3.0.4
Php Php 3.0.3
Php Php 3.0.8
Php Php 3.0.5
Php Php
Php Php 4.0.0
Php Php 4.0.1
Php Php 4.2.0
Php Php 4.3.1
1 EDB exploit
614
VMScore
CVE-2011-5157
Untrusted search path vulnerability in Attachmate Reflection prior to 14.1 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, a related issue to CVE-2011-0107. NOTE: some of these details are obtained from third party information.
Attachmate Reflection For Ibm 14.0
Attachmate Reflection For Ibm 14.1
Attachmate Reflection X 14.0
Attachmate Reflection X 14.1
Attachmate Reflection For Hp 14.0
Attachmate Reflection For Hp 14.1
Attachmate Reflection For Regis Graphics Server 14.0
Attachmate Reflection For Regis Graphics Server 14.1
Attachmate Reflection For Unix And Openvms 14.0
Attachmate Reflection For Unix And Openvms 14.1
606
VMScore
CVE-2021-2021
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Ser...
Oracle Mysql
Netapp Snapcenter -
Netapp Oncommand Workflow Automation -
Netapp Oncommand Insight -
Fedoraproject Fedora 32
Fedoraproject Fedora 33
605
VMScore
CVE-2020-5604
Android App 'Mercari' (Japan version) prior to version 3.52.0 allows arbitrary method execution of a Java object by a remote attacker via a Man-In-The-Middle attack by using Java Reflection API of JavaScript code on WebView.
Mercari Mercari
605
VMScore
CVE-2019-1019
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security Feature Bypass Vulner...
Microsoft Windows Server 2019 -
Microsoft Windows Server 2016 1903
Microsoft Windows Server 2016 -
Microsoft Windows 10 1703
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows 10 1809
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows 10 -
Microsoft Windows Server 2008 -
Microsoft Windows 8.1 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2012 -
Microsoft Windows 10 1903
Microsoft Windows 10 1607
1 EDB exploit
1 Github repository
1 Article
605
VMScore
CVE-2019-9497
The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an malicious user to complete EAP-PWD authentication without knowing the password. However, unless the cr...
W1.fi Hostapd
W1.fi Wpa Supplicant
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »