Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ea vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-26989
In the Linux kernel, the following vulnerability has been resolved: arm64: hibernate: Fix level3 translation fault in swsusp_save() On arm64 machines, swsusp_save() faults if it attempts to access MEMBLOCK_NOMAP memory ranges. This can be reproduced in QEMU using UEFI when bootin...
NA
CVE-2024-35885
In the Linux kernel, the following vulnerability has been resolved: mlxbf_gige: stop interface during shutdown The mlxbf_gige driver intermittantly encounters a NULL pointer exception while the system is shutting down via "reboot" command. The mlxbf_driver will experien...
NA
CVE-2024-36928
In the Linux kernel, the following vulnerability has been resolved: s390/qeth: Fix kernel panic after setting hsuid Symptom: When the hsuid attribute is set for the first time on an IQD Layer3 device while the corresponding network interface is already UP, the kernel will try to ...
5.5
CVSSv3
CVE-2023-52463
In the Linux kernel, the following vulnerability has been resolved: efivarfs: force RO when remounting if SetVariable is not supported If SetVariable at runtime is not supported by the firmware we never assign a callback for that function. At the same time mount the efivarfs as R...
Linux Linux Kernel
NA
CVE-2023-52856
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: lt8912b: Fix crash on bridge detach The lt8912b driver, in its bridge detach function, calls drm_connector_unregister() and drm_connector_cleanup(). drm_connector_unregister() should be called only fo...
5.5
CVSSv3
CVE-2024-23851
copy_params in drivers/md/dm-ioctl.c in the Linux kernel up to and including 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.
Linux Linux Kernel
NA
CVE-2015-6280
The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E prior to 3.6.3E, 3.7E prior to 3.7.1E, 3.10S prior to 3.10.6S, 3.11S prior to 3.11.4S, 3.12S prior to 3.12.3S, 3.13S prior to 3.13.3S, and 3.14S prior to 3.14.1S does not properly implement RSA authen...
Cisco Ios 15.2\\(2\\)e
Cisco Ios 15.4\\(1\\)s
Cisco Ios 15.4\\(2\\)s
Cisco Ios 15.4\\(2\\)t
Cisco Ios 15.4\\(1\\)t2
Cisco Ios 15.4\\(1\\)t1
Cisco Ios 15.4\\(1\\)t3
Cisco Ios 15.5\\(1\\)s
Cisco Ios 15.4\\(3\\)m1
Cisco Ios 15.4\\(2\\)t2
Cisco Ios 15.3\\(3\\)s
Cisco Ios 15.2\\(1\\)sy
Cisco Ios 15.3\\(3\\)m2
Cisco Ios 15.3\\(3\\)m5
Cisco Ios 15.4\\(3\\)s
Cisco Ios 15.3\\(3\\)m4
Cisco Ios 15.3\\(3\\)s5
Cisco Ios 15.5\\(1\\)t
Cisco Ios 15.4\\(2\\)t1
Cisco Ios 15.4\\(3\\)s1
Cisco Ios 15.4\\(3\\)s2
Cisco Ios 15.2\\(2a\\)e1
6.5
CVSSv3
CVE-2020-26140
An issue exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
Alfa Awus036h Firmware 6.1316.1209
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
Siemens Scalance W1788-2 Firmware -
Siemens Scalance W1788-2ia Firmware -
Siemens Scalance W721-1 Firmware -
Siemens Scalance W722-1 Firmware -
Siemens Scalance W734-1 Firmware -
Siemens Scalance W738-1 Firmware -
Siemens Scalance W748-1 Firmware -
Siemens Scalance W761-1 Firmware -
Siemens Scalance W774-1 Firmware -
Siemens Scalance W778-1 Firmware -
Siemens Scalance W786-1 Firmware -
Siemens Scalance W786-2 Firmware -
Siemens Scalance W786-2ia Firmware -
Siemens Scalance W788-1 Firmware -
Siemens Scalance W788-2 Firmware -
Siemens Scalance Wam763-1 Firmware -
Siemens Scalance Wam766-1 Firmware -
Siemens Scalance Wam766-1 6ghz Firmware -
3.5
CVSSv3
CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is ...
Ieee Ieee 802.11
Linux Mac80211 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Windows 10 20h2
Debian Debian Linux 9.0
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
NA
CVE-2024-1151
A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflo...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »