Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
remote code vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2022-30129
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
7.8
CVSSv3
CVE-2023-24893
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
1 Github repository
NA
CVE-2008-1491
Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote malicious users to execute arbitrary code via a long string to TCP port 623.
Asus Remote Console 2.0.0.19
Asus Remote Console 2.0.0.24
2 EDB exploits
7.8
CVSSv3
CVE-2020-17104
Visual Studio Code JSHint Extension Remote Code Execution Vulnerability
Microsoft Visual Studio Code -
7.8
CVSSv3
CVE-2020-17159
Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability
Microsoft Visual Studio Code
7.8
CVSSv3
CVE-2021-27084
Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability
Microsoft Visual Studio Code -
7.8
CVSSv3
CVE-2021-43891
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
7.8
CVSSv3
CVE-2021-31211
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
7.8
CVSSv3
CVE-2021-31214
Visual Studio Code Remote Code Execution Vulnerability
Microsoft Visual Studio Code
8.8
CVSSv3
CVE-2021-21677
Jenkins Code Coverage API Plugin 1.4.0 and previous versions does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability.
Jenkins Code Coverage Api
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »