Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
network security services vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2022-46692
A logic issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may bypass Same ...
Apple Watchos
Apple Ipados
Apple Iphone Os
Apple Tvos
Apple Macos
Apple Safari
Apple Icloud
8.8
CVSSv3
CVE-2022-46700
A memory corruption issue was addressed with improved input validation. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code ex...
Apple Macos 13.0
Apple Watchos
Apple Iphone Os
Apple Ipados
Apple Tvos
Apple Safari
6.5
CVSSv3
CVE-2022-41915
Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and before 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values i...
Netty Netty
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.5
CVSSv3
CVE-2022-41881
Netty project is an event-driven asynchronous network application framework. In versions before 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no worka...
Netty Netty
Debian Debian Linux 10.0
Debian Debian Linux 11.0
6.5
CVSSv3
CVE-2021-37533
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage o...
Apache Commons Net
Debian Debian Linux 10.0
Debian Debian Linux 11.0
2 Github repositories
NA
CVE-2021-32912
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
7.8
CVSSv3
CVE-2022-40304
An issue exists in libxml2 prior to 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
Xmlsoft Libxml2
Netapp Clustered Data Ontap -
Netapp Smi-s Provider -
Netapp Clustered Data Ontap Antivirus Connector -
Netapp Active Iq Unified Manager -
Netapp Manageability Software Development Kit -
Netapp Snapmanager -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
Netapp H410c Firmware -
Apple Macos
Apple Watchos
Apple Tvos
Apple Ipados
Apple Iphone Os
7.5
CVSSv3
CVE-2022-40303
An issue exists in libxml2 prior to 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation...
Xmlsoft Libxml2
Netapp Ontap Select Deploy Administration Utility -
Netapp Clustered Data Ontap -
Netapp Clustered Data Ontap Antivirus Connector -
Netapp Active Iq Unified Manager -
Netapp Snapmanager -
Netapp Netapp Manageability Sdk -
Apple Macos
Apple Watchos
Apple Tvos
Apple Ipados
Apple Iphone Os
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
Netapp H410c Firmware -
6.5
CVSSv3
CVE-2022-20922
Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote malicious user to bypass the configured policies or cause a denial of service (DoS) condition on an affe...
Cisco Firepower Threat Defense 7.1.0
Cisco Firepower Threat Defense 7.2.0.1
Cisco Firepower Threat Defense 7.1.0.1
Cisco Firepower Threat Defense 7.1.0.2
Cisco Firepower Threat Defense 7.2.0
Cisco Umbrella Insights Virtual Appliance 1.5.5
Cisco Umbrella Insights Virtual Appliance 1.5.6
Cisco Umbrella Insights Virtual Appliance 2.0.0
Cisco Umbrella Insights Virtual Appliance 2.0.2
Cisco Umbrella Insights Virtual Appliance 2.0.3
Cisco Umbrella Insights Virtual Appliance 2.1.0
Cisco Umbrella Insights Virtual Appliance 2.1.2
Cisco Umbrella Insights Virtual Appliance 2.1.5
Cisco Umbrella Insights Virtual Appliance 2.1.4
Cisco Umbrella Insights Virtual Appliance 2.4.12
Cisco Umbrella Insights Virtual Appliance 2.4.6
Cisco Umbrella Insights Virtual Appliance 2.4
Cisco Umbrella Insights Virtual Appliance 2.4.4
Cisco Umbrella Insights Virtual Appliance 2.5
Cisco Umbrella Insights Virtual Appliance 2.5.4
Cisco Umbrella Insights Virtual Appliance 2.5.5
Cisco Umbrella Insights Virtual Appliance 2.5.6
5.8
CVSSv3
CVE-2022-20943
Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote malicious user to bypass the configured policies or cause a denial of service (DoS) condition on an affe...
Cisco Firepower Threat Defense 7.0.0
Cisco Firepower Threat Defense 7.0.1
Cisco Firepower Threat Defense 7.0.0.1
Cisco Firepower Threat Defense 7.0.1.1
Cisco Cyber Vision 4.0.2
Cisco Cyber Vision 3.0.0
Cisco Cyber Vision 3.0.1
Cisco Cyber Vision 3.0.2
Cisco Cyber Vision 3.0.3
Cisco Cyber Vision 3.0.5
Cisco Cyber Vision 3.0.6
Cisco Cyber Vision 3.1.0
Cisco Cyber Vision 3.1.2
Cisco Cyber Vision 3.1.1
Cisco Cyber Vision 3.2.3
Cisco Cyber Vision 3.2.1
Cisco Cyber Vision 3.2.4
Cisco Cyber Vision 3.2.0
Cisco Cyber Vision 3.2.2
Cisco Cyber Vision 4.0.0
Cisco Cyber Vision 4.0.1
Cisco Cyber Vision 4.0.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »