Show filters
52 Total Results
Displaying 11-20 of 52
Sort by:
Attacker Value
Unknown

CVE-2020-17469

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.
Attacker Value
Unknown

CVE-2020-24383

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code for processing resource records in mDNS queries doesn't check for proper '\0' termination of the resource record name string, leading to an out-of-bounds read, and potentially causing information leak or Denial-or-Service.
Attacker Value
Unknown

CVE-2020-17467

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN.
Attacker Value
Unknown

CVE-2020-17468

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.
Attacker Value
Unknown

CVE-2020-27886

Disclosure Date: October 29, 2020 (last updated February 22, 2025)
An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is called by login.php).
Attacker Value
Unknown

CVE-2020-27887

Disclosure Date: October 29, 2020 (last updated February 22, 2025)
An issue was discovered in EyesOfNetwork 5.3 through 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php.
Attacker Value
Unknown

CVE-2020-24390

Disclosure Date: August 27, 2020 (last updated February 22, 2025)
eonweb in EyesOfNetwork before 5.3-7 does not properly escape the username on the /module/admin_logs page, which might allow pre-authentication stored XSS during login/logout logs recording.
Attacker Value
Unknown

CVE-2020-8656

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php.
Attacker Value
Unknown

CVE-2020-8655

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
An issue was discovered in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE script for nmap 7.
Attacker Value
Unknown

CVE-2020-8654

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
An issue was discovered in EyesOfNetwork 5.3. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the /module/module_frame/index.php autodiscovery.php target field.