Show filters
3,391 Total Results
Displaying 31-40 of 3,391
Sort by:
Attacker Value
Unknown

CVE-2023-28959

Disclosure Date: April 12, 2023 (last updated October 08, 2023)
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on QFX10002 allows an unauthenticated, adjacent attacker on the local broadcast domain sending a malformed packet to the device, causing all PFEs other than the inbound PFE to wedge and to eventually restart, resulting in a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue can only be triggered by sending a specific malformed packet to the device. Transit traffic does not trigger this issue. An indication of this issue occurring can be seen through the following log messages: fpc0 expr_hostbound_packet_handler: Receive pe 73? fpc0 Cmerror Op Set: PE Chip: PE0[0]: PGQ:misc_intr: 0x00000020: Enqueue of a packet with out-of-range VOQ in 192K-VOQ mode (URI: /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL) The logs list below can also be obse…
Attacker Value
Unknown

CVE-2022-25836

Disclosure Date: December 12, 2022 (last updated October 08, 2023)
Bluetooth® Low Energy Pairing in Bluetooth Core Specification v4.0 through v5.3 may permit an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access when the MITM negotiates Legacy Passkey Pairing with the pairing Initiator and Secure Connections Passkey Pairing with the pairing Responder and brute forces the Passkey entered by the user into the Initiator. The MITM attacker can use the identified Passkey value to complete authentication with the Responder via Bluetooth pairing method confusion.
Attacker Value
Unknown

CVE-2022-40765

Disclosure Date: November 22, 2022 (last updated October 08, 2023)
A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker with internal network access to conduct a command-injection attack, due to insufficient restriction of URL parameters.
Attacker Value
Unknown

CVE-2022-41223

Disclosure Date: November 22, 2022 (last updated October 08, 2023)
The Director database component of MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker to conduct a code-injection attack via crafted data due to insufficient restrictions on the database data type.
Attacker Value
Unknown

CVE-2022-22306

Disclosure Date: May 24, 2022 (last updated October 07, 2023)
An improper certificate validation vulnerability [CWE-295] in FortiOS 6.0.0 through 6.0.14, 6.2.0 through 6.2.10, 6.4.0 through 6.4.8, 7.0.0 may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the FortiGate and some peers such as private SDNs and external cloud platforms.
Attacker Value
Unknown

CVE-2021-26443

Disclosure Date: November 10, 2021 (last updated December 29, 2023)
Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2021-36967

Disclosure Date: September 15, 2021 (last updated December 29, 2023)
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2021-36965

Disclosure Date: September 15, 2021 (last updated December 29, 2023)
Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2020-27266

Disclosure Date: January 19, 2021 (last updated October 07, 2023)
In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, a client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass user authentication checks via Bluetooth Low Energy.
Attacker Value
Unknown

CVE-2020-27269

Disclosure Date: January 19, 2021 (last updated October 07, 2023)
In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, the communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications lacks replay protection measures, which allows unauthenticated, physically proximate attackers to replay communication sequences via Bluetooth Low Energy.