Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
advertisement vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-7312
The OSPF implementation on Enterasys switches and routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote malicious users to cause a denial of servi...
Enterasys G3 -
Enterasys K6 -
Enterasys K10 -
Enterasys S180 -
Enterasys C5 -
Enterasys S140 -
Enterasys S150 -
Enterasys S130 -
Enterasys S155 -
NA
CVE-2006-4776
Heap-based buffer overflow in the VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) allows remote malicious users to execute arbitrary code via a long VLAN name in a VTP type 2 summary advertisement.
Cisco Ios 12.1\\(19\\)
3.5
CVSSv3
CVE-2020-13597
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the ...
Projectcalico Calico
Projectcalico Calico 3.14.0
NA
CVE-2013-7307
The OSPF implementation on the Brocade Vyatta vRouter with software prior to 6.6R1 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote malicious users t...
Brocade Vyatta Vrouter Software
Brocade Vyatta Vrouter -
NA
CVE-2013-7314
The OSPF implementation on NEC IP38X, IX1000, IX2000, and IX3000 routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote malicious users to cause a ...
Nec Ip38x 3000 -
Nec Ip38x 1200 -
Nec Ip38x 810 -
Nec Ip38x 250i -
Nec Ip38x 2000 -
Nec Ip38x 105 -
Nec Ip38x 140 -
Nec Ip38x 300 -
Nec Ip38x 1100 -
Nec Ip38x 107e -
Nec Ip38x 1500 -
Nec Ip38x 1000 -
NA
CVE-2013-2894
drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel up to and including 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate malicious users to cause a denial of service (heap-based out-of-bounds write) via a craf...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
NA
CVE-2013-7313
The OSPF implementation in Juniper Junos up to and including 13.x, JunosE, and ScreenOS up to and including 6.3.x does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which ...
Juniper Screenos 6.2.0
Juniper Screenos
Juniper Junose
Juniper Junos 4.0
Juniper Junos 5.7
Juniper Junos 6.0
Juniper Junos 6.1
Juniper Junos 6.2
Juniper Junos 8.3
Juniper Junos 8.4
Juniper Junos 9.0
Juniper Junos 9.1
Juniper Junos 9.2
Juniper Junos 11.2
Juniper Junos 11.3
Juniper Junos 11.4
Juniper Junos 11.4x27
Juniper Junos 5.0
Juniper Junos 5.0r3
Juniper Junos 5.0r4
Juniper Junos 5.1
Juniper Junos 5.2
NA
CVE-2010-4670
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(3) and previous versions, and Cisco PIX Security Appliances devices, allows remote malicious users to cause a denial of service ...
Cisco Adaptive Security Appliance Software
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0\\(0\\)
Cisco Adaptive Security Appliance Software 7.0\\(2\\)
Cisco Adaptive Security Appliance Software 7.0\\(4\\)
Cisco Adaptive Security Appliance Software 7.0\\(5\\)
Cisco Adaptive Security Appliance Software 7.0\\(5.2\\)
Cisco Adaptive Security Appliance Software 7.0\\(6.7\\)
Cisco Adaptive Security Appliance Software 7.0.1
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.2
Cisco Adaptive Security Appliance Software 7.0.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Adaptive Security Appliance Software 7.0.5
Cisco Adaptive Security Appliance Software 7.0.6
Cisco Adaptive Security Appliance Software 7.0.7
Cisco Adaptive Security Appliance Software 7.0.8
Cisco Adaptive Security Appliance Software 7.1
Cisco Adaptive Security Appliance Software 7.1\\(2\\)
Cisco Adaptive Security Appliance Software 7.1\\(2.5\\)
Cisco Adaptive Security Appliance Software 7.1\\(2.27\\)
Cisco Adaptive Security Appliance Software 7.1\\(2.48\\)
NA
CVE-2013-7308
The OSPF implementation on the D-Link DES-3810-28 switch with firmware R2.20.B017 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote malicious users to...
Dlink Des-3810-28 Firmware R2.20.b017
Dlink Des-3810-28 -
NA
CVE-2015-6937
The __rds_conn_create function in net/rds/connection.c in the Linux kernel up to and including 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound...
Linux Linux Kernel
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Debian Debian Linux 8.0
Debian Debian Linux 7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »