Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
remote code vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2023-36742
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
7.8
CVSSv3
CVE-2020-17104
Visual Studio Code JSHint Extension Remote Code Execution Vulnerability
Microsoft Visual Studio Code -
7.8
CVSSv3
CVE-2021-27084
Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability
Microsoft Visual Studio Code -
7.8
CVSSv3
CVE-2020-17159
Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability
Microsoft Visual Studio Code
7.8
CVSSv3
CVE-2021-43891
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
7.8
CVSSv3
CVE-2021-31211
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
7.8
CVSSv3
CVE-2021-31214
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
8.8
CVSSv3
CVE-2021-21677
Jenkins Code Coverage API Plugin 1.4.0 and previous versions does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability.
Jenkins Code Coverage Api
9.8
CVSSv3
CVE-2019-18869
Leftover Debug Code in Blaauw Remote Kiln Control through v3.00r4 allows a user to execute arbitrary php code via /default.php?idx=17.
Blaauwproducts Remote Kiln Control
Blaauwproducts Remote Kiln Control 3.0.0
9.8
CVSSv3
CVE-2023-42359
SQL injection vulnerability in Exam Form Submission in PHP with Source Code v.1.0 allows a remote malicious user to escalate privileges via the val-username parameter in /index.php.
Exam Form Submission In Php With Source Code Project Exam Form Submission In Php With Source Code 1.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »