Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ea vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-36884
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault() This was missed because of the function pointer indirection. nvidia_smmu_context_fault() is also installed as a irq function, and the 'void...
NA
CVE-2021-47440
In the Linux kernel, the following vulnerability has been resolved: net: encx24j600: check error in devm_regmap_init_encx24j600 devm_regmap_init may return error which caused by like out of memory, this will results in null pointer dereference later when reading or writing regist...
NA
CVE-2021-47531
In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP In commit 510410bfc034 ("drm/msm: Implement mmap as GEM object function") we switched to a new/cleaner method of doing things. That's good, but we...
NA
CVE-2021-46983
In the Linux kernel, the following vulnerability has been resolved: nvmet-rdma: Fix NULL deref when SEND is completed with error When running some traffic and taking down the link on peer, a retry counter exceeded error is received. This leads to nvmet_rdma_error_comp which tried...
NA
CVE-2021-47023
In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix port event handling on init For some reason there might be a crash during ports creation if port events are handling at the same time because fw may send initial port event with down s...
2.6
CVSSv3
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device se...
Ieee Ieee 802.11
Linux Mac80211 -
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
5.3
CVSSv3
CVE-2020-26139
An issue exists in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected...
Netbsd Netbsd 7.1
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
Cisco 1109-2p Firmware -
7.5
CVSSv3
CVE-2016-6382
Cisco IOS 15.2 up to and including 15.6 and IOS XE 3.6 up to and including 3.17 and 16.1 allow remote malicious users to cause a denial of service (device restart) via a malformed IPv6 Protocol Independent Multicast (PIM) register packet, aka Bug ID CSCuy16399.
Cisco Ios Xe 3.6.4e
Cisco Ios 15.4\\(3\\)m
Cisco Ios Xe 3.10.1s
Cisco Ios 15.4\\(2\\)s
Cisco Ios 15.4\\(2\\)t3
Cisco Ios Xe 3.12.0s
Cisco Ios 15.5\\(1\\)t1
Cisco Ios Xe 3.7.2e
Cisco Ios 15.2\\(1\\)sy1a
Cisco Ios 15.5\\(3\\)s1
Cisco Ios 15.5\\(2\\)t1
Cisco Ios 15.5\\(3\\)s1a
Cisco Ios Xe 3.11.3s
Cisco Ios 15.3\\(3\\)s1
Cisco Ios Xe 16.1.2
Cisco Ios 15.2\\(2\\)ea1
Cisco Ios Xe 3.14.3s
Cisco Ios Xe 16.1.1
Cisco Ios 15.3\\(3\\)s2
Cisco Ios 15.5\\(1\\)t3
Cisco Ios Xe 3.6.3e
Cisco Ios 15.4\\(1\\)t4
NA
CVE-2015-6280
The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E prior to 3.6.3E, 3.7E prior to 3.7.1E, 3.10S prior to 3.10.6S, 3.11S prior to 3.11.4S, 3.12S prior to 3.12.3S, 3.13S prior to 3.13.3S, and 3.14S prior to 3.14.1S does not properly implement RSA authen...
Cisco Ios 15.2\\(2\\)e
Cisco Ios 15.4\\(1\\)s
Cisco Ios 15.4\\(2\\)s
Cisco Ios 15.4\\(2\\)t
Cisco Ios 15.4\\(1\\)t2
Cisco Ios 15.4\\(1\\)t1
Cisco Ios 15.4\\(1\\)t3
Cisco Ios 15.5\\(1\\)s
Cisco Ios 15.4\\(3\\)m1
Cisco Ios 15.4\\(2\\)t2
Cisco Ios 15.3\\(3\\)s
Cisco Ios 15.2\\(1\\)sy
Cisco Ios 15.3\\(3\\)m2
Cisco Ios 15.3\\(3\\)m5
Cisco Ios 15.4\\(3\\)s
Cisco Ios 15.3\\(3\\)m4
Cisco Ios 15.3\\(3\\)s5
Cisco Ios 15.5\\(1\\)t
Cisco Ios 15.4\\(2\\)t1
Cisco Ios 15.4\\(3\\)s1
Cisco Ios 15.4\\(3\\)s2
Cisco Ios 15.2\\(2a\\)e1
5.5
CVSSv3
CVE-2024-0340
A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local pri...
Linux Linux Kernel
Linux Linux Kernel 6.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »