Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ea vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2023-52463
In the Linux kernel, the following vulnerability has been resolved: efivarfs: force RO when remounting if SetVariable is not supported If SetVariable at runtime is not supported by the firmware we never assign a callback for that function. At the same time mount the efivarfs as R...
Linux Linux Kernel
5.3
CVSSv3
CVE-2020-26139
An issue exists in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected...
Netbsd Netbsd 7.1
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
Cisco 1109-2p Firmware -
2.6
CVSSv3
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device se...
Ieee Ieee 802.11
Linux Mac80211 -
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
5.5
CVSSv3
CVE-2024-23851
copy_params in drivers/md/dm-ioctl.c in the Linux kernel up to and including 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.
Linux Linux Kernel
7.5
CVSSv3
CVE-2016-6382
Cisco IOS 15.2 up to and including 15.6 and IOS XE 3.6 up to and including 3.17 and 16.1 allow remote malicious users to cause a denial of service (device restart) via a malformed IPv6 Protocol Independent Multicast (PIM) register packet, aka Bug ID CSCuy16399.
Cisco Ios Xe 3.6.4e
Cisco Ios 15.4\\(3\\)m
Cisco Ios Xe 3.10.1s
Cisco Ios 15.4\\(2\\)s
Cisco Ios 15.4\\(2\\)t3
Cisco Ios Xe 3.12.0s
Cisco Ios 15.5\\(1\\)t1
Cisco Ios Xe 3.7.2e
Cisco Ios 15.2\\(1\\)sy1a
Cisco Ios 15.5\\(3\\)s1
Cisco Ios 15.5\\(2\\)t1
Cisco Ios 15.5\\(3\\)s1a
Cisco Ios Xe 3.11.3s
Cisco Ios 15.3\\(3\\)s1
Cisco Ios Xe 16.1.2
Cisco Ios 15.2\\(2\\)ea1
Cisco Ios Xe 3.14.3s
Cisco Ios Xe 16.1.1
Cisco Ios 15.3\\(3\\)s2
Cisco Ios 15.5\\(1\\)t3
Cisco Ios Xe 3.6.3e
Cisco Ios 15.4\\(1\\)t4
NA
CVE-2015-6280
The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E prior to 3.6.3E, 3.7E prior to 3.7.1E, 3.10S prior to 3.10.6S, 3.11S prior to 3.11.4S, 3.12S prior to 3.12.3S, 3.13S prior to 3.13.3S, and 3.14S prior to 3.14.1S does not properly implement RSA authen...
Cisco Ios 15.2\\(2\\)e
Cisco Ios 15.4\\(1\\)s
Cisco Ios 15.4\\(2\\)s
Cisco Ios 15.4\\(2\\)t
Cisco Ios 15.4\\(1\\)t2
Cisco Ios 15.4\\(1\\)t1
Cisco Ios 15.4\\(1\\)t3
Cisco Ios 15.5\\(1\\)s
Cisco Ios 15.4\\(3\\)m1
Cisco Ios 15.4\\(2\\)t2
Cisco Ios 15.3\\(3\\)s
Cisco Ios 15.2\\(1\\)sy
Cisco Ios 15.3\\(3\\)m2
Cisco Ios 15.3\\(3\\)m5
Cisco Ios 15.4\\(3\\)s
Cisco Ios 15.3\\(3\\)m4
Cisco Ios 15.3\\(3\\)s5
Cisco Ios 15.5\\(1\\)t
Cisco Ios 15.4\\(2\\)t1
Cisco Ios 15.4\\(3\\)s1
Cisco Ios 15.4\\(3\\)s2
Cisco Ios 15.2\\(2a\\)e1
NA
CVE-2024-1151
A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflo...
NA
CVE-2022-48640
In the Linux kernel, the following vulnerability has been resolved: bonding: fix NULL deref in bond_rr_gen_slave_id Fix a NULL dereference of the struct bonding.rr_tx_counter member because if a bond is initially created with an initial mode != zero (Round Robin) the memory requi...
7.5
CVSSv3
CVE-2020-1649
When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of small fragments requiri...
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.2x75
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
5.3
CVSSv3
CVE-2020-1655
When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of large packets requiring...
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.2x75
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »