Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
security vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-32503
An issue exists on certain Nuki Home Solutions devices. An attacker with physical access to this JTAG port may be able to connect to the device and bypass both hardware and software security protections. This affects Nuki Keypad prior to 1.9.2 and Nuki Fob prior to 1.8.1.
NA
CVE-2020-36662
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
NA
CVE-2024-5678
Ethical Hacking Technical Report Client: [TeckMart] Date: [10-05-2024] Prepared by: [April Lyn Monte] and [Bergel Lumapag] Executive Summary The technical results of the TechMart ethical hacking assessment are presented in this paper. The evaluation's goal was to find weakne...
1 Github repository
NA
CVE-2024-24787
On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.
1 Github repository
NA
CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
NA
CVE-2024-33612
An improper certificate validation vulnerability exists in BIG-IP Next Central Manager and may allow an malicious user to impersonate an Instance Provider system. A successful exploit of this vulnerability can allow the malicious user to cross a security boundary. Note: Software...
NA
CVE-2024-23551
Database scanning using username and password stores the credentials in plaintext or encoded format within files at the endpoint. This has been identified as a significant security risk. This will lead to exposure of sensitive information for unauthorized access, potentially lead...
NA
CVE-2024-34346
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. The Deno sandbox may be unexpectedly weakened by allowing file read/write access to privileged files in various locations on Unix and Windows platforms. For example, reading `/proc/self/environ` may p...
NA
CVE-2024-4559
Heap buffer overflow in WebAudio in Google Chrome before 124.0.6367.155 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
1 Article
NA
CVE-2024-4558
Use after free in ANGLE in Google Chrome before 124.0.6367.155 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »