Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
black security vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-6212
Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &l...
Mozilla Thunderbird
Mozilla Firefox
Mozilla Firefox Esr
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
3.9
CVSSv3
CVE-2023-32453
Dell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.
Dell Alienware M15 R7 Firmware
Dell Alienware M16 Firmware
Dell Alienware M18 Firmware
Dell Chengming 3900 Firmware
Dell Chengming 3901 Firmware
Dell Chengming 3910 Firmware
Dell Chengming 3911 Firmware
Dell G15 5520 Firmware
Dell G16 7620 Firmware
Dell G3 3500 Firmware
Dell G5 15 5500 Firmware
Dell G7 15 7500 Firmware
Dell G7 17 7700 Firmware
Dell Precision 5680 Firmware
Dell Inspiron 14 5410 Firmware
Dell Inspiron 14 5418 Firmware
Dell Inspiron 15 3511 Firmware
Dell Inspiron 15 5510 Firmware
Dell Inspiron 15 5518 Firmware
Dell Inspiron 24 5420 All-in-one Firmware
Dell Inspiron 24 5421 All-in-one Firmware
Dell Inspiron 27 7720 All-in-one Firmware
NA
CVE-2001-0895
Multiple Cisco networking products allow remote malicious users to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite ...
Cisco Catalyst 4908g-l3
Cisco Catalyst 5000
Cisco Catalyst 3500xl
Cisco Catalyst 2900xl
Cisco Catalyst 3550
Cisco Catalyst 8500
Cisco Distributed Director
Cisco Catalyst 2948g-l3
Cisco Catalyst 2950
Cisco Catalyst 6000
Cisco Catalyst 4000
NA
CVE-2001-0741
Cisco Hot Standby Routing Protocol (HSRP) allows local malicious users to cause a denial of service by spoofing HSRP packets.
Cisco Hsrp
1 EDB exploit
NA
CVE-2002-1220
BIND 8.3.x up to and including 8.3.3 allows remote malicious users to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 8.3.0
Isc Bind 8.3.3
Openbsd Openbsd 3.1
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.4
Openbsd Openbsd 3.2
Openbsd Openbsd 3.0
Freebsd Freebsd 4.6
1 EDB exploit
NA
CVE-2002-1221
BIND 8.x up to and including 8.3.3 allows remote malicious users to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference.
Isc Bind 8.2
Isc Bind 8.1
Isc Bind 8.2.1
Isc Bind 8.2.5
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 8.1.2
Isc Bind 8.2.2
Isc Bind 8.2.4
Isc Bind 8.2.6
Isc Bind 8.3.0
Isc Bind 8.3.3
Isc Bind 8.1.1
Isc Bind 8.2.3
Openbsd Openbsd 3.1
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.4
Openbsd Openbsd 3.2
Openbsd Openbsd 3.0
Freebsd Freebsd 4.6
NA
CVE-2002-1219
Buffer overflow in named in BIND 4 versions 4.9.10 and previous versions, and 8 versions 8.3.3 and previous versions, allows remote malicious users to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).
Isc Bind 8.2
Isc Bind 8.2.1
Isc Bind 8.2.5
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 4.9.8
Isc Bind 4.9.6
Isc Bind 8.2.2
Isc Bind 8.2.4
Isc Bind 4.9.10
Isc Bind 8.2.6
Isc Bind 4.9.7
Isc Bind 8.3.0
Isc Bind 8.3.3
Isc Bind 4.9.9
Isc Bind 4.9.5
Isc Bind 8.2.3
Openbsd Openbsd 3.1
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.4
Openbsd Openbsd 3.2
7.8
CVSSv3
CVE-2017-13093
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of encrypted IP cyphertext to insert hardware trojans. The methods are flawed and, in the m...
- - -
7.8
CVSSv3
CVE-2017-13094
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of the encryption key and insertion of hardware trojans in any IP. The methods are flawed a...
- - -
7.8
CVSSv3
CVE-2017-13095
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of a license-deny response to a license grant. The methods are flawed and, in the most egre...
- - -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »