Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
advanced message server vulnerabilities and exploits
(subscribe to this query)
7.4
CVSSv3
CVE-2019-1696
Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote malicious user to cause a denial of service (DoS) condition. For more information...
Cisco Firepower Management Center 2.9.11
Cisco Firepower Management Center 2.9.12
Cisco Firepower Management Center 2.9.13
Cisco Firepower Management Center 2.9.9
Cisco Firepower Management Center 2.9.10
Cisco Firepower Management Center 2.9.8
Cisco Firepower Threat Defense
7.3
CVSSv3
CVE-2016-2209
Buffer overflow in Dec2SS.dll in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x up to and including 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) prior to 12.1 RU6 MP5; Symantec E...
Symantec Mail Security For Microsoft Exchange 6.5.8
Symantec Mail Security For Microsoft Exchange
Symantec Norton Power Eraser
Symantec Protection Engine 7.8.0
Symantec Protection Engine
Symantec Endpoint Protection 12.1.6
Symantec Message Gateway
Symantec Norton 360
Symantec Norton Antivirus
Symantec Norton Internet Security
Symantec Norton Security With Backup
Symantec Norton Security
Symantec Ngc
Symantec Message Gateway For Service Providers 10.5
Symantec Message Gateway For Service Providers 10.6
Symantec Norton Bootable Removal Tool
Symantec Mail Security For Domino
Symantec Data Center Security Server 6.0
Symantec Data Center Security Server 6.5
Symantec Data Center Security Server 6.6
Symantec Norton Security
Symantec Advanced Threat Protection
1 EDB exploit
7.3
CVSSv3
CVE-2016-2210
Buffer overflow in Dec2LHA.dll in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x up to and including 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) prior to 12.1 RU6 MP5; Symantec ...
Symantec Mail Security For Microsoft Exchange
Symantec Mail Security For Microsoft Exchange 6.5.8
Symantec Norton Power Eraser
Symantec Protection Engine
Symantec Protection Engine 7.8.0
Symantec Endpoint Protection 12.1.6
Symantec Message Gateway
Symantec Norton Antivirus
Symantec Norton Internet Security
Symantec Norton Security
Symantec Norton Security With Backup
Symantec Norton 360
Symantec Ngc
Symantec Message Gateway For Service Providers 10.6
Symantec Message Gateway For Service Providers 10.5
Symantec Norton Bootable Removal Tool
Symantec Mail Security For Domino
Symantec Data Center Security Server 6.5
Symantec Data Center Security Server 6.6
Symantec Data Center Security Server 6.0
Symantec Norton Security
Symantec Advanced Threat Protection
1 EDB exploit
7.2
CVSSv3
CVE-2019-11508
In Pulse Secure Pulse Connect Secure (PCS) prior to 8.1R15.1, 8.2 prior to 8.2R12.1, 8.3 prior to 8.3R7.1, and 9.0 prior to 9.0R3.4, an authenticated attacker (via the admin web interface) can exploit Directory Traversal to execute arbitrary code on the appliance.
Pulsesecure Pulse Connect Secure 7.4
Ivanti Connect Secure 9.0
Ivanti Connect Secure 8.1
Ivanti Connect Secure 8.2
Ivanti Connect Secure 8.3
Ivanti Connect Secure 7.1
Ivanti Connect Secure 7.4
7.2
CVSSv3
CVE-2019-11539
In Pulse Secure Pulse Connect Secure version 9.0RX prior to 9.0R3.4, 8.3RX prior to 8.3R7.1, 8.2RX prior to 8.2R12.1, and 8.1RX prior to 8.1R15.1 and Pulse Policy Secure version 9.0RX prior to 9.0R3.2, 5.4RX prior to 5.4R7.1, 5.3RX prior to 5.3R12.1, 5.2RX prior to 5.2R12.1, and ...
Pulsesecure Pulse Connect Secure 8.2r1.1
Pulsesecure Pulse Policy Secure 5.1r5.0
Pulsesecure Pulse Policy Secure 5.1r1.1
Pulsesecure Pulse Policy Secure 5.1r2.0
Pulsesecure Pulse Policy Secure 5.2r7.0
Pulsesecure Pulse Policy Secure 5.3r7.0
Pulsesecure Pulse Policy Secure 5.3r4.1
Pulsesecure Pulse Policy Secure 5.3r2.0
Pulsesecure Pulse Policy Secure 5.3r3.0
Pulsesecure Pulse Policy Secure 5.3r1.0
Pulsesecure Pulse Policy Secure 5.1r2.1
Pulsesecure Pulse Policy Secure 5.1r1.0
Pulsesecure Pulse Connect Secure 8.2r2.0
Pulsesecure Pulse Connect Secure 8.1r1.0
Pulsesecure Pulse Connect Secure 8.2r4.0
Pulsesecure Pulse Policy Secure 5.2r2.0
Pulsesecure Pulse Policy Secure 5.1r7.0
Pulsesecure Pulse Policy Secure 5.3r5.1
Pulsesecure Pulse Policy Secure 5.3r4.0
Pulsesecure Pulse Policy Secure 5.1r3.2
Pulsesecure Pulse Policy Secure 5.2r7.1
Pulsesecure Pulse Policy Secure 5.1r3.0
2 EDB exploits
2 Github repositories
1 Article
7.2
CVSSv3
CVE-2019-11542
In Pulse Secure Pulse Connect Secure version 9.0RX prior to 9.0R3.4, 8.3RX prior to 8.3R7.1, 8.2RX prior to 8.2R12.1, and 8.1RX prior to 8.1R15.1 and Pulse Policy Secure version 9.0RX prior to 9.0R3.2, 5.4RX prior to 5.4R7.1, 5.3RX prior to 5.3R12.1, 5.2RX prior to 5.2R12.1, and ...
Pulsesecure Pulse Connect Secure 8.2r1.1
Pulsesecure Pulse Policy Secure 5.1r5.0
Pulsesecure Pulse Policy Secure 5.1r1.1
Pulsesecure Pulse Policy Secure 5.1r2.0
Pulsesecure Pulse Policy Secure 5.2r7.0
Pulsesecure Pulse Policy Secure 5.3r7.0
Pulsesecure Pulse Policy Secure 5.3r4.1
Pulsesecure Pulse Policy Secure 5.3r2.0
Pulsesecure Pulse Policy Secure 5.3r3.0
Pulsesecure Pulse Policy Secure 5.3r1.0
Pulsesecure Pulse Policy Secure 5.1r2.1
Pulsesecure Pulse Policy Secure 5.1r1.0
Pulsesecure Pulse Connect Secure 8.2r2.0
Pulsesecure Pulse Connect Secure 8.1r1.0
Pulsesecure Pulse Connect Secure 8.2r4.0
Pulsesecure Pulse Policy Secure 5.2r2.0
Pulsesecure Pulse Policy Secure 5.1r7.0
Pulsesecure Pulse Policy Secure 5.3r5.1
Pulsesecure Pulse Policy Secure 5.3r4.0
Pulsesecure Pulse Policy Secure 5.1r3.2
Pulsesecure Pulse Policy Secure 5.2r7.1
Pulsesecure Pulse Policy Secure 5.1r3.0
6.5
CVSSv3
CVE-2022-1705
Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid.
Golang Go
6.5
CVSSv3
CVE-2022-32148
Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the ...
Golang Go
6.5
CVSSv3
CVE-2022-32206
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, a...
Haxx Curl
Fedoraproject Fedora 35
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Netapp Element Software -
Netapp Clustered Data Ontap -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Bootstrap Os -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
Siemens Scalance Sc622-2c Firmware
Siemens Scalance Sc626-2c Firmware
Siemens Scalance Sc632-2c Firmware
Siemens Scalance Sc636-2c Firmware
Siemens Scalance Sc642-2c Firmware
Siemens Scalance Sc646-2c Firmware
Splunk Universal Forwarder 9.1.0
Splunk Universal Forwarder
6.5
CVSSv3
CVE-2022-27776
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
Haxx Curl
Fedoraproject Fedora 36
Fedoraproject Fedora 37
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Netapp Hci Bootstrap Os -
Netapp Clustered Data Ontap -
Netapp Solidfire \\& Hci Management Node -
Netapp Solidfire \\& Hci Storage Node -
Brocade Fabric Operating System -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
Splunk Universal Forwarder 9.1.0
Splunk Universal Forwarder
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »