Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
stormshield stormshield network security 4.4.0 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-7465
The L2TP implementation of MPD prior to 5.9 allows a remote attacker who can send specifically crafted L2TP control packet with AVP Q.931 Cause Code to execute arbitrary code or cause a denial of service (memory corruption).
Mpd Project Mpd
Stormshield Stormshield Network Security
Stormshield Stormshield Network Security 4.4.0
7.5
CVSSv3
CVE-2020-7466
The PPP implementation of MPD prior to 5.9 allows a remote attacker who can send specifically crafted PPP authentication message to cause the daemon to read beyond allocated memory buffer, which would result in a denial of service condition.
Mpd Project Mpd
Stormshield Stormshield Network Security
Stormshield Stormshield Network Security 4.4.0
6.5
CVSSv3
CVE-2023-47093
An issue exists in Stormshield Network Security (SNS) 4.0.0 up to and including 4.3.21, 4.4.0 up to and including 4.6.8, and 4.7.0. Sending a crafted ICMP packet may lead to a crash of the ASQ engine.
Stormshield Stormshield Network Security 4.7.0
Stormshield Stormshield Network Security
NA
CVE-2023-41165
An issue exists in Stormshield Network Security (SNS) 3.7.0 up to and including 3.7.38 prior to 3.7.39, 3.10.0 up to and including 3.11.26 prior to 3.11.27, 4.0 up to and including 4.3.21 prior to 4.3.22, and 4.4.0 up to and including 4.6.8 prior to 4.6.9. An administrator with w...
NA
CVE-2023-34198
In Stormshield Network Security (SNS) 1.0.0 up to and including 3.7.36 prior to 3.7.37, 3.8.0 up to and including 3.11.24 prior to 3.11.25, 4.0.0 up to and including 4.3.18 prior to 4.3.19, 4.4.0 up to and including 4.6.5 prior to 4.6.6, and 4.7.0 prior to 4.7.1, the usage of a N...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started