Known Vulnerabilities for Ipset by Netfilter

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationNetfilterIpset7.1AllAllAll
ApplicationNetfilterIpset7.0AllAllAll
ApplicationNetfilterIpset6.9.1AllAllAll
ApplicationNetfilterIpset6.9AllAllAll
ApplicationNetfilterIpset6.8AllAllAll
ApplicationNetfilterIpset6.7AllAllAll
ApplicationNetfilterIpset6.6AllAllAll
ApplicationNetfilterIpset6.5AllAllAll
ApplicationNetfilterIpset6.4AllAllAll
ApplicationNetfilterIpset6.38AllAllAll
ApplicationNetfilterIpset6.37AllAllAll
ApplicationNetfilterIpset6.36AllAllAll
ApplicationNetfilterIpset6.35AllAllAll
ApplicationNetfilterIpset6.34AllAllAll
ApplicationNetfilterIpset6.33AllAllAll
ApplicationNetfilterIpset6.32AllAllAll
ApplicationNetfilterIpset6.31AllAllAll
ApplicationNetfilterIpset6.30AllAllAll
ApplicationNetfilterIpset6.3AllAllAll
ApplicationNetfilterIpset6.29AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report