Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco meraki mx - vulnerabilities and exploits
(subscribe to this query)
8.1
CVSSv3
CVE-2020-25682
A flaw was found in dnsmasq prior to 2.83. A buffer overflow vulnerability exists in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with...
Thekelleys Dnsmasq
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 Article
5.8
CVSSv3
CVE-2022-20943
Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote malicious user to bypass the configured policies or cause a denial of service (DoS) condition on an affe...
Cisco Firepower Threat Defense 7.0.0
Cisco Firepower Threat Defense 7.0.1
Cisco Firepower Threat Defense 7.0.0.1
Cisco Firepower Threat Defense 7.0.1.1
Cisco Cyber Vision 4.0.2
Cisco Cyber Vision 3.0.0
Cisco Cyber Vision 3.0.1
Cisco Cyber Vision 3.0.2
Cisco Cyber Vision 3.0.3
Cisco Cyber Vision 3.0.5
Cisco Cyber Vision 3.0.6
Cisco Cyber Vision 3.1.0
Cisco Cyber Vision 3.1.2
Cisco Cyber Vision 3.1.1
Cisco Cyber Vision 3.2.3
Cisco Cyber Vision 3.2.1
Cisco Cyber Vision 3.2.4
Cisco Cyber Vision 3.2.0
Cisco Cyber Vision 3.2.2
Cisco Cyber Vision 4.0.0
Cisco Cyber Vision 4.0.1
Cisco Cyber Vision 4.0.3
6.5
CVSSv3
CVE-2022-20922
Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote malicious user to bypass the configured policies or cause a denial of service (DoS) condition on an affe...
Cisco Firepower Threat Defense 7.1.0
Cisco Firepower Threat Defense 7.2.0.1
Cisco Firepower Threat Defense 7.1.0.1
Cisco Firepower Threat Defense 7.1.0.2
Cisco Firepower Threat Defense 7.2.0
Cisco Umbrella Insights Virtual Appliance 1.5.5
Cisco Umbrella Insights Virtual Appliance 1.5.6
Cisco Umbrella Insights Virtual Appliance 2.0.0
Cisco Umbrella Insights Virtual Appliance 2.0.2
Cisco Umbrella Insights Virtual Appliance 2.0.3
Cisco Umbrella Insights Virtual Appliance 2.1.0
Cisco Umbrella Insights Virtual Appliance 2.1.2
Cisco Umbrella Insights Virtual Appliance 2.1.5
Cisco Umbrella Insights Virtual Appliance 2.1.4
Cisco Umbrella Insights Virtual Appliance 2.4.12
Cisco Umbrella Insights Virtual Appliance 2.4.6
Cisco Umbrella Insights Virtual Appliance 2.4
Cisco Umbrella Insights Virtual Appliance 2.4.4
Cisco Umbrella Insights Virtual Appliance 2.5
Cisco Umbrella Insights Virtual Appliance 2.5.4
Cisco Umbrella Insights Virtual Appliance 2.5.5
Cisco Umbrella Insights Virtual Appliance 2.5.6
7.4
CVSSv3
CVE-2021-3450
The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve paramet...
Openssl Openssl
Freebsd Freebsd 12.2
Netapp Santricity Smi-s Provider Firmware -
Netapp Storagegrid Firmware -
Windriver Linux -
Windriver Linux 18.0
Windriver Linux 19.0
Windriver Linux 17.0
Netapp Oncommand Workflow Automation -
Netapp Storagegrid -
Netapp Ontap Select Deploy Administration Utility -
Netapp Cloud Volumes Ontap Mediator -
Fedoraproject Fedora 34
Tenable Nessus Agent
Tenable Nessus
Tenable Nessus Network Monitor 5.11.1
Tenable Nessus Network Monitor 5.12.0
Tenable Nessus Network Monitor 5.12.1
Tenable Nessus Network Monitor 5.13.0
Tenable Nessus Network Monitor 5.11.0
Oracle Jd Edwards World Security A9.4
Oracle Weblogic Server 12.2.1.4.0
1 Github repository
1 Article
5.3
CVSSv3
CVE-2020-26142
An issue exists in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
Openbsd Openbsd 6.6
6.5
CVSSv3
CVE-2020-26143
An issue exists in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configura...
Alfa Awus036h Firmware 1030.36.604
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11n Firmware
5.4
CVSSv3
CVE-2020-26147
An issue exists in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragment...
Linux Linux Kernel
Debian Debian Linux 9.0
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11n Firmware
Siemens Scalance W1700 Ieee 802.11ac Firmware
5.9
CVSSv3
CVE-2021-3449
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_ce...
Openssl Openssl
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Freebsd Freebsd 12.2
Netapp Santricity Smi-s Provider -
Netapp Snapcenter -
Netapp Oncommand Workflow Automation -
Netapp Storagegrid -
Netapp Oncommand Insight -
Netapp Ontap Select Deploy Administration Utility -
Netapp Active Iq Unified Manager -
Netapp Cloud Volumes Ontap Mediator -
Netapp E-series Performance Analyzer -
Tenable Tenable.sc
Tenable Nessus
Tenable Nessus Network Monitor 5.11.1
Tenable Nessus Network Monitor 5.12.0
Tenable Nessus Network Monitor 5.12.1
Tenable Nessus Network Monitor 5.13.0
Tenable Nessus Network Monitor 5.11.0
Tenable Log Correlation Engine
Fedoraproject Fedora 34
5 Github repositories
1 Article
3.5
CVSSv3
CVE-2020-24586
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragm...
Ieee Ieee 802.11
Debian Debian Linux 9.0
Linux Mac80211 -
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Intel Ax210 Firmware
Intel Ax201 Firmware
Intel Ax200 Firmware
Intel Ac 9560 Firmware
Intel Ac 9462 Firmware
Intel Ac 9461 Firmware
Intel Ac 9260 Firmware
Intel Ac 8265 Firmware
Intel Ac 8260 Firmware
Intel Ac 3168 Firmware
Intel Ac 7265 Firmware
Intel Ac 3165 Firmware
Intel Ax1675 Firmware -
Intel Ax1650 Firmware -
5.3
CVSSv3
CVE-2020-26146
An issue exists on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fr...
Samsung Galaxy I9305 Firmware 4.4.4
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Arista C-120 Firmware
Arista C-130 Firmware
Arista C-100 Firmware
Arista C-110 Firmware
Arista O-105 Firmware
Arista W-118 Firmware
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11n Firmware
Siemens Scalance W1700 Ieee 802.11ac Firmware
Siemens Scalance W1750d Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37884
CVE-2024-6003
remote
brute force
information disclosure
CVE-2024-27801
CVE-2024-30078
CVE-2024-31870
CVE-2024-6042
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »