Show filters
16 Total Results
Displaying 11-16 of 16
Sort by:
Attacker Value
Unknown
CVE-2020-8277
Disclosure Date: November 19, 2020 (last updated February 22, 2025)
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
0
Attacker Value
Unknown
CVE-2019-9506
Disclosure Date: August 14, 2019 (last updated November 27, 2024)
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
0
Attacker Value
Unknown
CVE-2017-1000381
Disclosure Date: July 07, 2017 (last updated November 26, 2024)
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
0
Attacker Value
Unknown
CVE-2016-5180
Disclosure Date: October 03, 2016 (last updated November 08, 2023)
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
0
Attacker Value
Unknown
CVE-2007-3153
Disclosure Date: June 11, 2007 (last updated October 04, 2023)
The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.
0
Attacker Value
Unknown
CVE-2007-3152
Disclosure Date: June 11, 2007 (last updated October 04, 2023)
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
0