Show filters
392 Total Results
Displaying 121-130 of 392
Sort by:
Attacker Value
Unknown
CVE-2020-11902
Disclosure Date: June 17, 2020 (last updated February 21, 2025)
The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.
0
Attacker Value
Unknown
CVE-2020-11912
Disclosure Date: June 17, 2020 (last updated February 21, 2025)
The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.
0
Attacker Value
Unknown
CVE-2020-10136 — IP-in-IP protocol routes arbitrary traffic by default
Disclosure Date: June 01, 2020 (last updated February 21, 2025)
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
0
Attacker Value
Unknown
CVE-2020-12740
Disclosure Date: May 08, 2020 (last updated February 21, 2025)
tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
0
Attacker Value
Unknown
CVE-2020-8037
Disclosure Date: April 21, 2020 (last updated February 22, 2025)
The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.
0
Attacker Value
Unknown
CVE-2020-8036
Disclosure Date: February 29, 2020 (last updated February 22, 2025)
The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.
0
Attacker Value
Unknown
CVE-2012-5389
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
NULL Pointer Dereference in PowerTCP WebServer for ActiveX 1.9.2 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted HTTP request.
0
Attacker Value
Unknown
CVE-2019-13943
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify content of particular web pages, causing the application to behave in unexpected ways for legitimate users. Successful exploitation does not require for an attacker to be authenticated to the web interface. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security. vulnerability was known.
0
Attacker Value
Unknown
CVE-2019-13942
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). An unauthorized user could exploit a buffer overflow vulnerability in the webserver. Specially crafted packets sent could cause a Denial-of-Service condition and if certain conditions are met, the affected devices must be restarted manually to fully recover. At the time of advisory publication no public exploitation of this security vulnerability was known.
0
Attacker Value
Unknown
CVE-2019-13944
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). A vulnerability in the integrated web server of the affected devices could allow unauthorized attackers to obtain sensitive information about the device, including logs and configurations. At the time of advisory publication no public exploitation of this security vulnerability was known.
0