Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco meraki mx firmware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-7999
Cisco-Meraki MS, MR, and MX devices with firmware prior to 2014-09-24 allow remote authenticated users to install arbitrary firmware by leveraging unspecified HTTP handler access on the local network, aka Cisco-Meraki defect ID 00478565.
Cisco Meraki Mr Firmware
Cisco Meraki Mr -
Cisco Meraki Ms Firmware
Cisco Meraki Ms -
Cisco Meraki Mx Firmware
Cisco Meraki Mx -
8.6
CVSSv3
CVE-2022-20933
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient...
Cisco Meraki Mx64 Firmware
Cisco Meraki Mx64w Firmware
Cisco Meraki Mx65 Firmware
Cisco Meraki Mx65w Firmware
Cisco Meraki Mx67 Firmware
Cisco Meraki Mx67cw Firmware
Cisco Meraki Mx67w Firmware
Cisco Meraki Mx68 Firmware
Cisco Meraki Mx68cw Firmware
Cisco Meraki Mx68w Firmware
Cisco Meraki Mx75 Firmware
Cisco Meraki Mx84 Firmware
Cisco Meraki Mx85 Firmware
Cisco Meraki Mx95 Firmware
Cisco Meraki Mx100 Firmware
Cisco Meraki Mx105 Firmware
Cisco Meraki Mx250 Firmware
Cisco Meraki Mx400 Firmware
Cisco Meraki Mx450 Firmware
Cisco Meraki Mx600 Firmware
Cisco Meraki Vmx Firmware
Cisco Meraki Z3c Firmware -
5.8
CVSSv3
CVE-2023-20071
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote malicious user to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection e...
Cisco Firepower Threat Defense
Cisco Cyber Vision
Cisco Unified Threat Defense
Cisco Meraki Mx Security Appliance Firmware -
NA
CVE-2014-7995
Cisco-Meraki MS, MR, and MX devices with firmware prior to 2014-09-24 allow physically proximate malicious users to obtain shell access by opening a device's case and connecting a cable to a serial port, aka Cisco-Meraki defect ID 00302077.
Cisco Meraki Mx Firmware
Cisco Meraki Mx -
Cisco Meraki Ms Firmware
Cisco Meraki Ms -
Cisco Meraki Mr Firmware
Cisco Meraki Mr -
NA
CVE-2014-7993
Cisco-Meraki MS, MR, and MX devices with firmware prior to 2014-09-24 allow remote malicious users to obtain sensitive credential information by leveraging unspecified HTTP handler access on the local network, aka Cisco-Meraki defect ID 00302012.
Cisco Meraki Mx Firmware
Cisco Meraki Mr Firmware
Cisco Meraki Ms Firmware
NA
CVE-2014-7994
Cisco-Meraki MS, MR, and MX devices with firmware prior to 2014-09-24 allow remote malicious users to execute arbitrary commands by leveraging knowledge of a cross-device secret and a per-device secret, and sending a request to an unspecified HTTP handler on the local network, ak...
Cisco Meraki Mr Firmware
Cisco Meraki Mr -
Cisco Meraki Mx Firmware
Cisco Meraki Mx -
Cisco Meraki Ms Firmware
Cisco Meraki Ms -
8.1
CVSSv3
CVE-2020-25682
A flaw was found in dnsmasq prior to 2.83. A buffer overflow vulnerability exists in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with...
Thekelleys Dnsmasq
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 Article
5.9
CVSSv3
CVE-2020-25683
A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow exists in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocat...
Thekelleys Dnsmasq
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 Article
3.7
CVSSv3
CVE-2020-25684
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the ex...
Thekelleys Dnsmasq
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Arista Eos
2 Github repositories
1 Article
3.7
CVSSv3
CVE-2020-25685
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is c...
Thekelleys Dnsmasq
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
Arista Eos
2 Github repositories
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »