Show filters
3,391 Total Results
Displaying 31-40 of 3,391
Sort by:
Attacker Value
Unknown
CVE-2023-28959
Disclosure Date: April 12, 2023 (last updated October 08, 2023)
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on QFX10002 allows an unauthenticated, adjacent attacker on the local broadcast domain sending a malformed packet to the device, causing all PFEs other than the inbound PFE to wedge and to eventually restart, resulting in a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue can only be triggered by sending a specific malformed packet to the device. Transit traffic does not trigger this issue. An indication of this issue occurring can be seen through the following log messages: fpc0 expr_hostbound_packet_handler: Receive pe 73? fpc0 Cmerror Op Set: PE Chip: PE0[0]: PGQ:misc_intr: 0x00000020: Enqueue of a packet with out-of-range VOQ in 192K-VOQ mode (URI: /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL) The logs list below can also be obse…
1
Attacker Value
Unknown
CVE-2022-25836
Disclosure Date: December 12, 2022 (last updated October 08, 2023)
Bluetooth® Low Energy Pairing in Bluetooth Core Specification v4.0 through v5.3 may permit an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access when the MITM negotiates Legacy Passkey Pairing with the pairing Initiator and Secure Connections Passkey Pairing with the pairing Responder and brute forces the Passkey entered by the user into the Initiator. The MITM attacker can use the identified Passkey value to complete authentication with the Responder via Bluetooth pairing method confusion.
1
Attacker Value
Unknown
CVE-2022-40765
Disclosure Date: November 22, 2022 (last updated October 08, 2023)
A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker with internal network access to conduct a command-injection attack, due to insufficient restriction of URL parameters.
1
Attacker Value
Unknown
CVE-2022-41223
Disclosure Date: November 22, 2022 (last updated October 08, 2023)
The Director database component of MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker to conduct a code-injection attack via crafted data due to insufficient restrictions on the database data type.
1
Attacker Value
Unknown
CVE-2022-22306
Disclosure Date: May 24, 2022 (last updated October 07, 2023)
An improper certificate validation vulnerability [CWE-295] in FortiOS 6.0.0 through 6.0.14, 6.2.0 through 6.2.10, 6.4.0 through 6.4.8, 7.0.0 may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the FortiGate and some peers such as private SDNs and external cloud platforms.
1
Attacker Value
Unknown
CVE-2021-26443
Disclosure Date: November 10, 2021 (last updated December 29, 2023)
Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
1
Attacker Value
Unknown
CVE-2021-36967
Disclosure Date: September 15, 2021 (last updated December 29, 2023)
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2021-36965
Disclosure Date: September 15, 2021 (last updated December 29, 2023)
Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
1
Attacker Value
Unknown
CVE-2020-27266
Disclosure Date: January 19, 2021 (last updated October 07, 2023)
In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, a client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass user authentication checks via Bluetooth Low Energy.
1
Attacker Value
Unknown
CVE-2020-27269
Disclosure Date: January 19, 2021 (last updated October 07, 2023)
In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, the communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications lacks replay protection measures, which allows unauthenticated, physically proximate attackers to replay communication sequences via Bluetooth Low Energy.
1