Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
shift vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2024-4733
The ShiftController Employee Shift Scheduling plugin is vulnerable to PHP Object Injection via deserialization of untrusted input via the `hc3_session`-cookie in versions up to, and including, 4.9.57. This makes it possible for an authenticated attacker with contributor access-le...
5.4
CVSSv3
CVE-2023-50924
Englesystem is a shift planning system for chaos events. Engelsystem prior to v3.4.1 performed insufficient validation of user supplied data for the DECT number, mobile number, and work-log comment fields. The values of those fields would be displayed in corresponding log overvie...
Engelsystem Engelsystem
8.8
CVSSv3
CVE-2018-9975
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
6.3
CVSSv3
CVE-2023-2685
A vulnerability was found in AO-OPC server versions mentioned above. As the directory information for the service entry is not enclosed in quotation marks, potential attackers could possibly call up another application than the AO-OPC server by starting the service. The service m...
Abb Ao-opc
5.3
CVSSv3
CVE-2023-41880
Wasmtime is a standalone runtime for WebAssembly. Wasmtime versions from 10.0.0 to versions 10.02, 11.0.2, and 12.0.1 contain a miscompilation of the WebAssembly `i64x2.shr_s` instruction on x86_64 platforms when the shift amount is a constant value that is larger than 32. Only x...
Bytecodealliance Wasmtime
NA
CVE-2021-46992
In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: avoid overflows in nft_hash_buckets() Number of buckets being stored in 32bit variables, we have to ensure that no overflows occur in nft_hash_buckets() syzbot injected a size == 0x40000000 a...
NA
CVE-2011-3650
Mozilla Firefox prior to 3.6.24 and 4.x up to and including 7.0 and Thunderbird prior to 3.1.6 and 5.0 up to and including 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote malicious users to cause a denial of service (memo...
Mozilla Firefox 3.6.7
Mozilla Firefox 3.6.8
Mozilla Firefox 3.6.9
Mozilla Firefox 3.6.16
Mozilla Firefox 3.6.17
Mozilla Firefox 3.5.10
Mozilla Firefox 3.5.15
Mozilla Firefox 3.5.4
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.6
Mozilla Firefox 3.6.14
Mozilla Firefox 3.6.15
Mozilla Firefox 3.6.22
Mozilla Firefox
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.11
Mozilla Firefox 3.5.8
Mozilla Firefox 3.5
Mozilla Firefox 3.0.14
Mozilla Firefox 3.0.11
Mozilla Firefox 3.0.12
Mozilla Firefox 3.0.15
7.8
CVSSv3
CVE-2024-26884
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix hashtab overflow check on 32-bit arches The hashtab code relies on roundup_pow_of_two() to compute the number of hash buckets, and contains an overflow check by checking if the resulting value is 0. Howe...
Linux Linux Kernel
7.5
CVSSv3
CVE-2021-20304
A flaw was found in OpenEXR's hufDecode functionality. This flaw allows an attacker who can pass a crafted file to be processed by OpenEXR, to trigger an undefined right shift error. The highest threat from this vulnerability is to system availability.
Openexr Openexr
4.6
CVSSv3
CVE-2019-18673
On SHIFT BitBox02 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable...
Shiftcrypto Bitbox02 -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »