Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ack vulnerabilities and exploits
(subscribe to this query)
516
VMScore
CVE-2019-13263
D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with a...
Dlink Dir-825\\/ac G1 Firmware -
NA
CVE-2021-46911
In the Linux kernel, the following vulnerability has been resolved: ch_ktls: Fix kernel panic Taking page refcount is not ideal and causes kernel panic sometimes. It's better to take tx_ctx lock for the complete skb transmit, to avoid page cleanup if ACK received in middle.
Linux Linux Kernel
890
VMScore
CVE-2004-0460
Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13 allows remote malicious users to cause a denial of service (server crash) and possibly execute arbitrary code via multiple hostname options in (1) DISCOVER, (2) OFFER, (3) R...
Infoblox Dns One Appliance 2.3.1 R5
Infoblox Dns One Appliance 2.4.0.8
Infoblox Dns One Appliance 2.4.0.8a
Isc Dhcpd 3.0.1
Suse Suse Email Server Iii
Suse Suse Linux Database Server
Suse Suse Linux Firewall Cd
Suse Suse Linux Office Server
Suse Suse Linux Admin-cd For Firewall
Suse Suse Linux Connectivity Server
Mandrakesoft Mandrake Linux 10.0
Suse Suse Linux 7
Suse Suse Linux 8.0
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 9.2
Suse Suse Linux 8.2
Suse Suse Linux 8
Redhat Fedora Core Core 2.0
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Mandrakesoft Mandrake Linux 9.0
Suse Suse Linux 8.1
694
VMScore
CVE-2017-17432
OpenAFS 1.x prior to 1.6.22 does not properly validate Rx ack packets, which allows remote malicious users to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
Openafs Openafs
Debian Debian Linux 9.0
Debian Debian Linux 8.0
445
VMScore
CVE-2015-7762
rx/rx.c in OpenAFS prior to 1.6.15 and 1.7.x prior to 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote malicious users to obtain sensitive information by (1) conducting a replay attack or...
Openafs Openafs 1.7.13
Openafs Openafs 1.7.14
Openafs Openafs 1.7.20
Openafs Openafs 1.7.21
Openafs Openafs 1.7.28
Openafs Openafs 1.7.29
Openafs Openafs
Openafs Openafs 1.7.1
Openafs Openafs 1.7.10
Openafs Openafs 1.7.17
Openafs Openafs 1.7.19
Openafs Openafs 1.7.24
Openafs Openafs 1.7.25
Openafs Openafs 1.7.4
Openafs Openafs 1.7.8
Openafs Openafs 1.7.15
Openafs Openafs 1.7.16
Openafs Openafs 1.7.22
Openafs Openafs 1.7.23
Openafs Openafs 1.7.3
Openafs Openafs 1.7.30
Openafs Openafs 1.7.31
445
VMScore
CVE-2015-7763
rx/rx.c in OpenAFS 1.5.75 up to and including 1.5.78, 1.6.x prior to 1.6.15, and 1.7.x prior to 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote malicious users to obtain sensitive information by (1) conducting a re...
Openafs Openafs 1.6.2
Openafs Openafs 1.6.3
Openafs Openafs 1.6.7
Openafs Openafs 1.6.8
Openafs Openafs 1.6.9
Openafs Openafs 1.7.10
Openafs Openafs 1.7.11
Openafs Openafs 1.7.18
Openafs Openafs 1.7.19
Openafs Openafs 1.7.26
Openafs Openafs 1.7.27
Openafs Openafs 1.7.8
Openafs Openafs 1.5.77
Openafs Openafs 1.5.78
Openafs Openafs 1.6.6
Openafs Openafs 1.6.5.1
Openafs Openafs 1.6.12
Openafs Openafs 1.6.13
Openafs Openafs 1.7.14
Openafs Openafs 1.7.15
Openafs Openafs 1.7.21
Openafs Openafs 1.7.22
NA
CVE-2023-52700
In the Linux kernel, the following vulnerability has been resolved: tipc: fix kernel warning when sending SYN message When sending a SYN message, this kernel stack trace is observed: ... [ 13.396352] RIP: 0010:_copy_from_iter+0xb4/0x550 ... [ 13.398494] Call Trace: [ 13.398630] &...
445
VMScore
CVE-2013-5641
The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.17.x up to and including 1.8.22.x, 1.8.23.x prior to 1.8.23.1, and 11.x prior to 11.5.1 and Certified Asterisk 1.8.15 prior to 1.8.15-cert3 and 11.2 prior to 11.2-cert2 allows remote malicious users to cause...
Digium Certified Asterisk 1.8.15
Digium Asterisk 11.4.0
Digium Asterisk 11.0.0
Digium Asterisk 11.1.0
Digium Asterisk 1.8.20.0
Digium Asterisk 1.8.17.0
Digium Asterisk 1.8.19.0
Digium Asterisk 1.8.19.1
Digium Certified Asterisk 11.2.0
Digium Asterisk 11.5.0
Digium Asterisk 11.0.1
Digium Asterisk 11.2.0
Digium Asterisk 1.8.23.0
Digium Asterisk 1.8.22.0
Digium Asterisk 1.8.18.0
Digium Asterisk 1.8.18.1
Digium Asterisk 11.3.0
Digium Asterisk 11.5.1
Digium Asterisk 11.0.2
Digium Asterisk 11.1.1
Digium Asterisk 11.1.2
Digium Asterisk 1.8.21.0
NA
CVE-2024-36889
In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_nxt is properly initialized on connect Christoph reported a splat hinting at a corrupted snd_una: WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/pro...
694
VMScore
CVE-2013-5209
The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 up to and including 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote malicious users to obtain sensitive inform...
Freebsd Freebsd 9.2
Freebsd Freebsd 8.3
Freebsd Freebsd 9.0
Freebsd Freebsd 9.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »