Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
para vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-20385
a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: A...
Google Android -
NA
CVE-2008-1944
Buffer overflow in the backend framebuffer of XenSource Xen Para-Virtualized Framebuffer (PVFB) Message 3.0 up to and including 3.0.3 allows local users to cause a denial of service (SDL crash) and possibly execute arbitrary code via "bogus screen updates," related to m...
Xensource Xen 3.0.3
Xensource Xen 3.0
9.8
CVSSv3
CVE-2023-7161
A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3.1. This affects an unknown part of the file index.php?para=index of the component Login. The manipulation of the argument check_VirtualSiteId leads to sql injection. It is p...
Netentsec Application Security Gateway Firmware 6.3.1
NA
CVE-2024-2646
A vulnerability classified as critical was found in Netentsec NS-ASG Application Security Gateway 6.3. This vulnerability affects unknown code of the file /vpnweb/index.php?para=index. The manipulation of the argument check_VirtualSiteId leads to sql injection. The attack can be ...
NA
CVE-2012-0217
The x86-64 kernel system-call functionality in Xen 4.1.2 and previous versions, as used in Citrix XenServer 6.0.2 and previous versions and other products; Oracle Solaris 11 and previous versions; illumos before r13724; Joyent SmartOS prior to 20120614T184600Z; FreeBSD prior to 9...
Freebsd Freebsd
Illumos Illumos
Joyent Smartos
Xen Xen 4.0.4
Xen Xen 4.1.0
Xen Xen 4.0.2
Xen Xen 4.0.3
Xen Xen 4.1.1
Xen Xen
Xen Xen 4.0.0
Xen Xen 4.0.1
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2003
Microsoft Windows Xp
Citrix Xenserver 6.0
Citrix Xenserver
Netbsd Netbsd
Sun Sunos
3 EDB exploits
3 Github repositories
1 Article
NA
CVE-2006-0744
Linux kernel prior to 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.15.2
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.11.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3