Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
unauthorized vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2002-2425
Sun AnswerBook2 1.2 up to and including 1.4.2 allows remote malicious users to execute administrative scripts such as (1) AdminViewError and (2) AdminAddadmin via a direct request.
Sun Solaris Answerbook2 1.2
Sun Solaris Answerbook2 1.4
Sun Solaris Answerbook2 1.4.1
Sun Solaris Answerbook2 1.4.2
Sun Solaris Answerbook2 1.3
1 EDB exploit
187
VMScore
CVE-2021-34771
A vulnerability in the Cisco IOS XR Software CLI could allow an authenticated, local malicious user to view more information than their privileges allow. This vulnerability is due to insufficient application of restrictions during the execution of a specific command. An attacker ...
Cisco Ios Xr
445
VMScore
CVE-2014-8036
The outlookpa component in Cisco WebEx Meetings Server does not properly validate API input, which allows remote malicious users to modify a meeting's invite list via a crafted URL, aka Bug ID CSCuj40254.
Cisco Webex Meetings Server -
445
VMScore
CVE-2018-0318
A vulnerability in the password reset function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote malicious user to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of a password reset request....
Cisco Prime Collaboration
Cisco Prime Collaboration Provisioning
445
VMScore
CVE-2018-0319
A vulnerability in the password recovery function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote malicious user to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of a password recovery re...
Cisco Prime Collaboration Provisioning
Cisco Prime Collaboration
187
VMScore
CVE-2021-1128
A vulnerability in the CLI parser of Cisco IOS XR Software could allow an authenticated, local malicious user to view more information than their privileges allow. The vulnerability is due to insufficient application of restrictions during the execution of a specific command. An ...
Cisco Ios Xr
Cisco Ios Xr 7.2.0
Cisco Ios Xr 7.3.0
505
VMScore
CVE-2003-1162
index.php in Tritanium Bulletin Board 1.2.3 allows remote malicious users to read and reply to arbitrary messages by modifying the thread_id, forum_id, and sid parameters.
Tritanium Scripts Tritanium Bulletin Board 1.2.1
Tritanium Scripts Tritanium Bulletin Board 1.2.2
Tritanium Scripts Tritanium Bulletin Board 1.1 Final
Tritanium Scripts Tritanium Bulletin Board 1.2
Tritanium Scripts Tritanium Bulletin Board 0.999 Beta
Tritanium Scripts Tritanium Bulletin Board 1.0 Beta
Tritanium Scripts Tritanium Bulletin Board 0.993 Beta
Tritanium Scripts Tritanium Bulletin Board 0.994 Beta
Tritanium Scripts Tritanium Bulletin Board 1.2.3
1 EDB exploit
578
VMScore
CVE-2015-0768
The Device Work Center (DWC) component in Cisco Prime Network Control System (NCS) 2.1(0.0.85), 2.2(0.0.58), and 2.2(0.0.69) does not properly implement AAA roles, which allows remote authenticated users to bypass intended access restrictions and execute commands via a login sess...
Cisco Prime Network Control System 2.1\\(0.0.85\\)
Cisco Prime Network Control System 2.2\\(0.0.58\\)
Cisco Prime Network Control System 2.2\\(0.0.69\\)
445
VMScore
CVE-2015-2073
The File RepositoRy Server (FRS) CORBA listener in SAP BussinessObjects Edge 4.0 allows remote malicious users to read arbitrary files via a full pathname, aka SAP Note 2018682.
Sap Businessobjects Edge 4.0
445
VMScore
CVE-2015-2074
The File Repository Server (FRS) CORBA listener in SAP BussinessObjects Edge 4.0 allows remote malicious users to write to arbitrary files via a full pathname, aka SAP Note 2018681.
Sap Businessobjects Edge 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »