Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intrusion sensor vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-5276
Stack-based buffer overflow in the DCE/RPC preprocessor in Snort prior to 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote malicious users to execute arbitrary code via crafted SMB traffic.
Snort Snort 2.6.1
Snort Snort 2.6.1.1
Sourcefire Intrusion Sensor 4.6
Snort Snort
Sourcefire Intrusion Sensor 4.5
Snort Snort 2.7 Beta1
Sourcefire Intrusion Sensor 4.1
4 EDB exploits
7.8
CVSSv2
CVE-2014-0719
The control-plane access-list implementation in Cisco IPS Software prior to 7.1(8p2)E4 and 7.2 prior to 7.2(2)E4 allows remote malicious users to cause a denial of service (MainApp process outage) via crafted packets to TCP port 7000, aka Bug ID CSCui67394.
Cisco Ips Sensor Software 7.1\\(3\\)e4
Cisco Ips Sensor Software 7.1\\(6\\)e4
Cisco Ips Sensor Software 7.1\\(8\\)e4
Cisco Ips Sensor Software 7.2\\(1\\)e4
Cisco Ips Sensor Software
Cisco Ips Sensor Software 7.1\\(2\\)e4
Cisco Ips Sensor Software 7.1\\(4\\)e4
Cisco Ips Sensor Software 7.1\\(7\\)e4
7.8
CVSSv2
CVE-2013-1218
Cisco Intrusion Prevention System (IPS) Software in ASA 5500-X IPS-SSP software modules prior to 7.1(7)sp1E4 allows remote malicious users to cause a denial of service (Analysis Engine process hang or device reload) via fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCue512...
Cisco Ips 4510 Sensor -
Cisco Ips 4345 Sensor -
Cisco Ips Nme -
Cisco Idsm-2 -
Cisco Intrusion Prevention System
Cisco Asa 5500-x Series Ips Ssp Software 7.1
Cisco Asa 5585-x -
Cisco Ips 4520 Sensor -
Cisco Ips 4360 Sensor -
7.8
CVSSv2
CVE-2013-1243
The IP stack in Cisco Intrusion Prevention System (IPS) Software in ASA 5500-X IPS-SSP software and hardware modules prior to 7.1(5)E4, IPS 4500 sensors prior to 7.1(6)E4, and IPS 4300 sensors prior to 7.1(5)E4 allows remote malicious users to cause a denial of service (MainApp p...
Cisco Intrusion Prevention System
Cisco Asa 5500-x Series Ips Ssp Software 7.1
Cisco Ips 4360 Sensor -
Cisco Ips Nme -
Cisco Idsm-2 -
Cisco Asa 5585-x -
Cisco Ips 4520 Sensor -
Cisco Ips 4510 Sensor -
Cisco Ips 4345 Sensor -
7.8
CVSSv2
CVE-2007-2688
The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote malicious users to evade detection of HTTP traffic.
Cisco Ips Sensor Software 4.0
Cisco Ips Sensor Software 5.1\\(1d\\)
Cisco Ips Sensor Software 5.1\\(1e\\)
Cisco Ips Sensor Software 5.0\\(1\\)
Cisco Ips Sensor Software 5.0\\(2\\)
Cisco Ips Sensor Software 5.1\\(p1\\)
Cisco Ips Sensor Software 5.1\\(1a\\)
Cisco Ips Sensor Software 5.1\\(1b\\)
Cisco Ips Sensor Software 5.1\\(1c\\)
Cisco Ips Sensor Software 5.0\\(6\\)p1
Cisco Ips Sensor Software 5.1\\(1\\)
Cisco Ios 12.0s
Cisco Ios 12.0st
Cisco Ios 12.0t
Cisco Ios 12.1
Cisco Ios 11.3
Cisco Ios 12.0
Cisco Ios 12.2
Cisco Ios 12.2t
Cisco Ios 10.0
Cisco Ios 11.1cc
Cisco Ios 12.1e
7.5
CVSSv2
CVE-2005-3252
Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort prior to 2.4.3 allows remote malicious users to execute arbitrary code via a crafted UDP packet.
Sourcefire Snort 2.4.1
Sourcefire Snort 2.4.2
Sourcefire Snort 2.4.0
5 EDB exploits
7.5
CVSSv2
CVE-2004-0362
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote malicious users to execute arbitrary code via a SRV_MULTI response containing a SRV...
Iss Blackice Agent Server 3.6ecd
Iss Blackice Agent Server 3.6ece
Iss Blackice Pc Protection 3.6ccf
Iss Blackice Server Protection 3.6cbz
Iss Realsecure Desktop 3.6ebz
Iss Realsecure Desktop 3.6eca
Iss Realsecure Desktop 7.0ebg
Iss Realsecure Desktop 7.0ebh
Iss Realsecure Guard 3.6ecd
Iss Realsecure Guard 3.6ece
Iss Realsecure Sentry 3.6ebz
Iss Realsecure Sentry 3.6eca
Iss Realsecure Server Sensor 6.0.1 Win Sr1.1
Iss Realsecure Server Sensor 6.0
Iss Realsecure Server Sensor 6.5 Win Sr3.6
Iss Realsecure Server Sensor 6.5 Win Sr3.7
Iss Realsecure Server Sensor 7.0
Iss Blackice Agent Server 3.6ecf
Iss Blackice Pc Protection 3.6cbz
Iss Blackice Server Protection 3.6cca
Iss Blackice Server Protection 3.6ccb
Iss Realsecure Desktop 3.6ecb
2 EDB exploits
7.5
CVSSv2
CVE-2002-0059
The decompression algorithm in zlib 1.1.3 and previous versions, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote malicious users to execute arbitrary code vi...
Zlib Zlib
7.5
CVSSv2
CVE-2001-0669
Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort prior to 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS R...
Cisco Secure Intrusion Detection System
Iss Realsecure Network Sensor 5.x
Iss Realsecure Network Sensor 6.x
Iss Realsecure Server Sensor 5.5
Iss Realsecure Server Sensor 6.0
Snort Snort 1.8.1
Cisco Catalyst 6000 Intrusion Detection System Module
Enterasys Dragon 4.x
1 EDB exploit
7.2
CVSSv2
CVE-2018-0453
A vulnerability in the Sourcefire tunnel control channel protocol in Cisco Firepower System Software running on Cisco Firepower Threat Defense (FTD) sensors could allow an authenticated, local malicious user to execute specific CLI commands with root privileges on the Cisco Firep...
Cisco Firepower Threat Defense 6.0.1
Cisco Firepower Threat Defense 6.2.0
Cisco Firepower Threat Defense 6.2.1
Cisco Firepower Threat Defense 6.2.2
Cisco Firepower Threat Defense 6.0.0
Cisco Firepower Threat Defense 6.1.0
Cisco Firepower Threat Defense 5.4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4040
privilege escalation
CVE-2024-4112
CVE-2024-32872
man-in-the-middle
CVE-2024-32788
bypass
CVE-2024-3400
CVE-2024-28976
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »