Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netmask vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2015-7224
puppetlabs-mysql 3.1.0 up to and including 3.6.0 allow remote malicious users to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.
Puppet Puppetlabs-mysql
9.1
CVSSv3
CVE-2021-28918
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote malicious users to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on...
Netmask Project Netmask
1 Article
7.5
CVSSv3
CVE-2021-29424
The Net::Netmask module prior to 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows malicious users to bypass access control that is based on IP addresses.
Net\\ \\ Netmask Project
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
7.5
CVSSv3
CVE-2020-15052
An issue exists in Artica Proxy CE prior to 4.28.030.418. SQL Injection exists via the Netmask, Hostname, and Alias fields.
Articatech Artica Proxy
1 Github repository
7.5
CVSSv3
CVE-2019-12655
A vulnerability in the FTP application layer gateway (ALG) functionality used by Network Address Translation (NAT), NAT IPv6 to IPv4 (NAT64), and the Zone-Based Policy Firewall (ZBFW) in Cisco IOS XE Software could allow an unauthenticated, remote malicious user to cause an affec...
Cisco Ios 16.6.5
Cisco Ios 16.9.1
Cisco Ios 16.9.2
Cisco Ios
Cisco Ios 16.6.4
7.5
CVSSv3
CVE-2017-12231
A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 up to and including 15.6 could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due t...
Cisco Ios 15.4\\(3\\)m4
Cisco Ios 15.5\\(3\\)s2a
Cisco Ios 15.5\\(3\\)s4b
Cisco Ios 15.4\\(3\\)s7
Cisco Ios 15.6\\(2\\)sp2
Cisco Ios 15.5\\(3\\)s3a
Cisco Ios 15.5\\(3\\)m2
Cisco Ios 15.3\\(3\\)s8
Cisco Ios 15.6\\(2\\)s1
Cisco Ios 15.6\\(2\\)sp
Cisco Ios 15.2\\(5\\)e2b
Cisco Ios 15.4\\(3\\)s6a
Cisco Ios 15.4\\(1\\)s4
Cisco Ios 15.3\\(3\\)jpb2
Cisco Ios 15.4\\(3\\)s6b
Cisco Ios 15.3\\(3\\)m8a
Cisco Ios 15.6\\(2\\)s0a
Cisco Ios 15.3\\(3\\)m8
Cisco Ios 15.3\\(3\\)jc50
Cisco Ios 15.6\\(2\\)sp2a
Cisco Ios 15.5\\(2\\)s4
Cisco Ios 15.2\\(4\\)m10
7
CVSSv3
CVE-2017-2624
It was found that xorg-x11-server prior to 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is...
X.org Xorg-server
Debian Debian Linux 7.0
1 Github repository
6.8
CVSSv3
CVE-2022-43625
This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific f...
Dlink Dir-1935 Firmware
Dlink Dir-1935 Firmware 1.03
6.5
CVSSv3
CVE-2020-1637
A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Infranet Controller (IC) is confi...
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
6.5
CVSSv3
CVE-2017-12222
A vulnerability in the wireless controller manager of Cisco IOS XE could allow an unauthenticated, adjacent malicious user to cause a restart of the switch and result in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation. An attacker co...
Cisco Ios Xe 16.3.1
Cisco Ios Xe 16.3.3
Cisco Ios Xe 16.1.2
Cisco Ios Xe 16.3.2
Cisco Ios Xe 16.1.4
Cisco Ios Xe 16.1.3
Cisco Ios Xe 16.1.3a
Cisco Ios Xe 16.3.1a
Cisco Ios Xe 16.2.2a
Cisco Ios Xe 16.2.3
Cisco Ios Xe 16.1.1
Cisco Ios Xe 16.2.1
Cisco Ios Xe 16.2.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »