Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
security linux vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2013-1741
Integer overflow in Mozilla Network Security Services (NSS) 3.15 prior to 3.15.3 allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a large size value.
Mozilla Network Security Services 3.15
Mozilla Network Security Services 3.15.1
Mozilla Network Security Services 3.15.2
7.5
CVSSv2
CVE-2020-10180
The ESET AV parsing engine allows virus-detection bypass via a crafted BZ2 Checksum field in an archive. This affects versions prior to 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Andr...
Eset Cyber Security
Eset Mobile Security
Eset Nod32 Antivirus 4
Eset Nod32 Antivirus
Eset Smart Security
Eset Smart Tv Security
5.8
CVSSv2
CVE-2008-0792
Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote malicious users to bypass malware detection via a crafted CAB archive.
F-secure F-secure Anti-virus 2007
F-secure F-secure Anti-virus 2008
F-secure F-secure Anti-virus Client Security 6.03
F-secure F-secure Anti-virus For Workstations 7.10
F-secure F-secure Anti-virus Linux Client Security 5.52
F-secure F-secure Protection Service For Consumers
F-secure F-secure Anti-virus 2006
F-secure F-secure Anti-virus For Workstations 5.44
F-secure F-secure Anti-virus For Workstations 7.00
F-secure F-secure Internet Security 2008
F-secure F-secure Protection Service For Business
F-secure F-secure Anti-virus Client Security 7.10
F-secure F-secure Anti-virus For Linux 4.65
F-secure F-secure Internet Security 2007
F-secure F-secure Anti-virus Client Security 6.04
F-secure F-secure Anti-virus Client Security 7.01
F-secure F-secure Anti-virus Linux Client Security 5.53
F-secure F-secure Internet Security 2006
7.5
CVSSv2
CVE-2008-0910
Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote malicious users to bypass malware detection via a crafted RAR archive. NOTE: this might be related to CVE-2008...
F-secure F-secure Anti-virus 2006
F-secure F-secure Anti-virus For Linux 4.65
F-secure F-secure Anti-virus For Workstations 5.44
F-secure F-secure Internet Security 2007
F-secure F-secure Internet Security 2008
F-secure F-secure Anti-virus Client Security 7.01
F-secure F-secure Anti-virus Client Security 7.10
F-secure F-secure Internet Security 2006
F-secure F-secure Anti-virus 2007
F-secure F-secure Anti-virus 2008
F-secure F-secure Anti-virus For Workstations 7.00
F-secure F-secure Anti-virus For Workstations 7.10
F-secure F-secure Protection Service For Business
F-secure F-secure Protection Service For Consumers
F-secure F-secure Anti-virus Client Security 6.03
F-secure F-secure Anti-virus Client Security 6.04
F-secure F-secure Anti-virus Linux Client Security 5.52
F-secure F-secure Anti-virus Linux Client Security 5.53
6.8
CVSSv2
CVE-2014-3391
Untrusted search path vulnerability in Cisco ASA Software 8.x prior to 8.4(3), 8.5, and 8.7 prior to 8.7(1.13) allows local users to gain privileges by placing a Trojan horse library file in external memory, leading to library use after device reload because of an incorrect LD_LI...
Cisco Adaptive Security Appliance Software 8.7.8
Cisco Adaptive Security Appliance Software 8.3.2.40
Cisco Adaptive Security Appliance Software 8.3.1
Cisco Adaptive Security Appliance Software 8.2.2
Cisco Adaptive Security Appliance Software 8.3.1.1
Cisco Adaptive Security Appliance Software 8.3.1.6
Cisco Adaptive Security Appliance Software 8.2.5.40
Cisco Adaptive Security Appliance Software 8.2.1
Cisco Adaptive Security Appliance Software 8.2.2.12
Cisco Adaptive Security Appliance Software 8.2.5.22
Cisco Adaptive Security Appliance Software 8.2.5.33
Cisco Adaptive Security Appliance Software 8.2.5.41
Cisco Adaptive Security Appliance Software 8.2.4.4
Cisco Adaptive Security Appliance Software 8.2.2.10
Cisco Adaptive Security Appliance Software 8.3.2.37
Cisco Adaptive Security Appliance Software 8.3.2.39
Cisco Adaptive Security Appliance Software 8.2.5.26
Cisco Adaptive Security Appliance Software 8.3.2
Cisco Adaptive Security Appliance Software 8.3.2.33
Cisco Adaptive Security Appliance Software 8.2.4
Cisco Adaptive Security Appliance Software 8.3.2.41
Cisco Adaptive Security Appliance Software 8.2.4.1
5
CVSSv2
CVE-2017-5462
A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28....
Debian Debian Linux 8.0
Mozilla Firefox Esr
Mozilla Thunderbird
Mozilla Firefox
Mozilla Network Security Services
Mozilla Firefox Esr 52.0
7.5
CVSSv2
CVE-2002-1463
Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote malicious users to spoof connections...
Symantec Raptor Firewall 6.5
Symantec Raptor Firewall 6.5.3
Symantec Enterprise Firewall 6.5.2
Symantec Enterprise Firewall 7.0
Symantec Velociraptor Model 500
Symantec Velociraptor Model 700
Symantec Velociraptor Model 1200
Symantec Velociraptor Model 1300
Symantec Velociraptor Model 1000
Symantec Velociraptor Model 1100
Symantec Gateway Security 5110
Symantec Gateway Security 5200
Symantec Gateway Security 5300
1 EDB exploit
6.5
CVSSv2
CVE-2010-0147
SQL injection vulnerability in the Management Center for Cisco Security Agents 5.1 prior to 5.1.0.117, 5.2 prior to 5.2.0.296, and 6.0 prior to 6.0.1.132 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
Cisco Security Agent 6.0
Cisco Security Agent 5.1
Cisco Security Agent 5.2
NA
CVE-2024-20358
A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operat...
Cisco Adaptive Security Appliance Software 9.16.1
Cisco Adaptive Security Appliance Software 9.8.2
Cisco Adaptive Security Appliance Software 9.8.3.18
Cisco Adaptive Security Appliance Software 9.8.3.26
Cisco Adaptive Security Appliance Software 9.12.2
Cisco Adaptive Security Appliance Software 9.8.2.24
Cisco Adaptive Security Appliance Software 9.8.3.16
Cisco Adaptive Security Appliance Software 9.8.4.29
Cisco Adaptive Security Appliance Software 9.12.2.5
Cisco Adaptive Security Appliance Software 9.12.4.4
Cisco Adaptive Security Appliance Software 9.8.2.20
Cisco Adaptive Security Appliance Software 9.8.4
Cisco Adaptive Security Appliance Software 9.8.4.26
Cisco Adaptive Security Appliance Software 9.14.1.30
Cisco Adaptive Security Appliance Software 9.14.1.15
Cisco Adaptive Security Appliance Software 9.8.2.26
Cisco Adaptive Security Appliance Software 9.8.2.28
Cisco Adaptive Security Appliance Software 9.8.2.33
Cisco Adaptive Security Appliance Software 9.8.2.35
Cisco Adaptive Security Appliance Software 9.8.2.38
Cisco Adaptive Security Appliance Software 9.8.4.8
Cisco Adaptive Security Appliance Software 9.8.4.10
1 Article
4
CVSSv2
CVE-2021-33572
A Denial-of-Service (DoS) vulnerability exists in F-Secure Linux Security whereby the FSAVD component used in certain F-Secure products can crash while scanning larger packages/fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in ...
F-secure Cloud Protection For Salesforce -
F-secure Elements For Microsoft 365 -
F-secure Endpoint Protection
F-secure Linux Security -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »