Show filters
392 Total Results
Displaying 121-130 of 392
Sort by:
Attacker Value
Unknown

CVE-2020-11902

Disclosure Date: June 17, 2020 (last updated February 21, 2025)
The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.
Attacker Value
Unknown

CVE-2020-11912

Disclosure Date: June 17, 2020 (last updated February 21, 2025)
The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.
Attacker Value
Unknown

CVE-2020-10136 — IP-in-IP protocol routes arbitrary traffic by default

Disclosure Date: June 01, 2020 (last updated February 21, 2025)
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
Attacker Value
Unknown

CVE-2020-12740

Disclosure Date: May 08, 2020 (last updated February 21, 2025)
tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
Attacker Value
Unknown

CVE-2020-8037

Disclosure Date: April 21, 2020 (last updated February 22, 2025)
The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.
Attacker Value
Unknown

CVE-2020-8036

Disclosure Date: February 29, 2020 (last updated February 22, 2025)
The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.
Attacker Value
Unknown

CVE-2012-5389

Disclosure Date: January 23, 2020 (last updated February 21, 2025)
NULL Pointer Dereference in PowerTCP WebServer for ActiveX 1.9.2 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted HTTP request.
Attacker Value
Unknown

CVE-2019-13943

Disclosure Date: December 12, 2019 (last updated November 27, 2024)
A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify content of particular web pages, causing the application to behave in unexpected ways for legitimate users. Successful exploitation does not require for an attacker to be authenticated to the web interface. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security. vulnerability was known.
Attacker Value
Unknown

CVE-2019-13942

Disclosure Date: December 12, 2019 (last updated November 27, 2024)
A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). An unauthorized user could exploit a buffer overflow vulnerability in the webserver. Specially crafted packets sent could cause a Denial-of-Service condition and if certain conditions are met, the affected devices must be restarted manually to fully recover. At the time of advisory publication no public exploitation of this security vulnerability was known.
Attacker Value
Unknown

CVE-2019-13944

Disclosure Date: December 12, 2019 (last updated November 27, 2024)
A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). A vulnerability in the integrated web server of the affected devices could allow unauthorized attackers to obtain sensitive information about the device, including logs and configurations. At the time of advisory publication no public exploitation of this security vulnerability was known.