Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
unauthorized vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2016-1322
The REST interface in Cisco Spark 2015-07-04 allows remote malicious users to bypass intended access restrictions and create arbitrary user accounts via unspecified web requests, aka Bug ID CSCuv72584.
Cisco Spark 2015-07-04 Base
5.3
CVSSv3
CVE-2017-12363
A vulnerability in Cisco WebEx Meeting Server could allow an unauthenticated, remote malicious user to modify the welcome message of a meeting on an affected system. The vulnerability is due to insufficient security settings on meetings. An attacker could exploit this vulnerabili...
Cisco Webex Meetings Server 2.6.0.8
Cisco Webex Meetings Server 2.7
NA
CVE-2015-6395
Cisco Prime Service Catalog 10.0, 10.0(R2), 10.1, and 11.0 does not properly restrict access to web pages, which allows remote malicious users to modify the configuration via a direct request, aka Bug ID CSCuw48188.
Cisco Prime Service Catalog 10.1 Base
Cisco Prime Service Catalog 10.0 Base
Cisco Prime Service Catalog 11.0 Base
Cisco Prime Service Catalog 10.0\\(r2\\) Base
NA
CVE-2015-6417
Cisco Videoscape Distribution Suite Service Manager (VDS-SM) 3.4.0 and previous versions does not always use RBAC for backend database access, which allows remote authenticated users to read or write to database entries via (1) the GUI or (2) a crafted HTTP request, aka Bug ID CS...
Cisco Videoscape Distribution Suite Service Manager 3.4.0
Cisco Videoscape Distribution Suite Service Manager 3.2.0
Cisco Videoscape Distribution Suite Service Manager 3.0.0
Cisco Videoscape Distribution Suite Service Manager 3.1.0
Cisco Videoscape Distribution Suite Service Manager 3.3.0
9.8
CVSSv3
CVE-2018-0130
A vulnerability in the use of JSON web tokens by the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote malicious user to gain administrative access to an affected system. The vulnerability is due to the presence of stati...
Cisco Virtual Managed Services 3.0
5.8
CVSSv3
CVE-2016-1321
Cisco Universal Small Cell devices with firmware R2.12 through R3.5 contain an image-decryption key in flash memory, which allows remote malicious users to bypass a certain certificate-validation feature and obtain sensitive firmware-image and IP address data via a request to an ...
Cisco Universal Small Cell Firmware R3.4 Base
Cisco Universal Small Cell Firmware R3.3 Base
Cisco Universal Small Cell Firmware R2.12 Base
Cisco Universal Small Cell Firmware R3.4 2.17
Cisco Universal Small Cell Firmware R3.4 2.1
Cisco Universal Small Cell Firmware R2.16 Base
Cisco Universal Small Cell Firmware R2.15 Base
Cisco Universal Small Cell Firmware R3.4 1.1
Cisco Universal Small Cell Firmware R3.5 Base
Cisco Universal Small Cell Firmware R2.14 Base
Cisco Universal Small Cell Firmware R2.13 Base
Cisco Universal Small Cell Firmware R3.2 Base
Cisco Universal Small Cell Firmware R2.17 Base
NA
CVE-2001-1188
mailto.exe in Brian Dorricott MAILTO 1.0.9 and previous versions allows remote malicious users to send SPAM e-mail through remote servers by modifying the sendto, email, server, subject, and resulturl hidden form fields.
Brian Dorricott Mailto 1.0.7
Brian Dorricott Mailto 1.0.8
Brian Dorricott Mailto 1.0.9
1 EDB exploit
NA
CVE-2002-0922
CGIScript.net csNews.cgi allows remote malicious users to obtain database files via a direct URL-encoded request to (1) default%2edb or (2) default%2edb.style, or remote authenticated users to perform administrative actions via (3) a database parameter set to default%2edb.
Cgiscript.net Csnews 1.0
Cgiscript.net Csnews 1.0 Professional
1 EDB exploit
NA
CVE-2005-2729
The HTTP proxy in Astaro Security Linux 6.0 does not properly filter HTTP CONNECT requests to localhost, which allows remote malicious users to bypass firewall rules and connect to local services.
Astaro Security Linux 6.001
1 EDB exploit
NA
CVE-2003-1521
Sun Java Plug-In 1.4 up to and including 1.4.2_02 allows remote malicious users to repeatedly access the floppy drive via the createXmlDocument method in the org.apache.crimson.tree.XmlDocument class, which violates the Java security model.
Sun Java Plug-in 1.4
Sun Java Plug-in 1.4.2
Sun Java Plug-in 1.4.2 01
Sun Java Plug-in 1.4.2 02
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »